Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ORDER AND SPECIFICATIONS.scr.exe

Overview

General Information

Sample name:ORDER AND SPECIFICATIONS.scr.exe
Analysis ID:1559970
MD5:08b5fa6876e0dc8d5c226597d89e646b
SHA1:4b5f7b0dd2303c81427f9ab47ff9046c43718552
SHA256:402dc87138121e2ac00c7bc65bbdd39a9ab0091c3a1b163066924887a20ab361
Tags:exeuser-lowmal3
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates autostart registry keys with suspicious names
Delayed program exit found
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • ORDER AND SPECIFICATIONS.scr.exe (PID: 6840 cmdline: "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe" MD5: 08B5FA6876E0DC8D5C226597D89E646B)
    • powershell.exe (PID: 7084 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • ORDER AND SPECIFICATIONS.scr.exe (PID: 7076 cmdline: "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe" MD5: 08B5FA6876E0DC8D5C226597D89E646B)
      • remcos.exe (PID: 5800 cmdline: "C:\ProgramData\Remcos\remcos.exe" MD5: 08B5FA6876E0DC8D5C226597D89E646B)
        • powershell.exe (PID: 4076 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Remcos\remcos.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • conhost.exe (PID: 5640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • WmiPrvSE.exe (PID: 6892 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
        • remcos.exe (PID: 2144 cmdline: "C:\ProgramData\Remcos\remcos.exe" MD5: 08B5FA6876E0DC8D5C226597D89E646B)
          • iexplore.exe (PID: 6284 cmdline: "c:\program files (x86)\internet explorer\iexplore.exe" MD5: 6F0F06D6AB125A99E43335427066A4A1)
  • remcos.exe (PID: 5812 cmdline: "C:\ProgramData\Remcos\remcos.exe" MD5: 08B5FA6876E0DC8D5C226597D89E646B)
    • remcos.exe (PID: 5888 cmdline: "C:\ProgramData\Remcos\remcos.exe" MD5: 08B5FA6876E0DC8D5C226597D89E646B)
      • WerFault.exe (PID: 7056 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5888 -s 1980 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • remcos.exe (PID: 3264 cmdline: "C:\ProgramData\Remcos\remcos.exe" MD5: 08B5FA6876E0DC8D5C226597D89E646B)
    • remcos.exe (PID: 3744 cmdline: "C:\ProgramData\Remcos\remcos.exe" MD5: 08B5FA6876E0DC8D5C226597D89E646B)
    • remcos.exe (PID: 2496 cmdline: "C:\ProgramData\Remcos\remcos.exe" MD5: 08B5FA6876E0DC8D5C226597D89E646B)
  • remcos.exe (PID: 3140 cmdline: "C:\ProgramData\Remcos\remcos.exe" MD5: 08B5FA6876E0DC8D5C226597D89E646B)
    • remcos.exe (PID: 2208 cmdline: "C:\ProgramData\Remcos\remcos.exe" MD5: 08B5FA6876E0DC8D5C226597D89E646B)
    • remcos.exe (PID: 3512 cmdline: "C:\ProgramData\Remcos\remcos.exe" MD5: 08B5FA6876E0DC8D5C226597D89E646B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["16.54:6092:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-YJ70D0", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Enable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\Remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.1724701599.0000000000C3A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000011.00000002.1921104180.00000000010B7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000B.00000002.2956392919.0000000001417000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 36 entries
              SourceRuleDescriptionAuthorStrings
              0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                    • 0x69ef8:$a1: Remcos restarted by watchdog!
                    • 0x6a470:$a3: %02i:%02i:%02i:%03i
                    0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpackREMCOS_RAT_variantsunknownunknown
                    • 0x64194:$str_a1: C:\Windows\System32\cmd.exe
                    • 0x64110:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x64110:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x64610:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                    • 0x64c10:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                    • 0x64204:$str_b2: Executing file:
                    • 0x6503c:$str_b3: GetDirectListeningPort
                    • 0x64a00:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                    • 0x64b80:$str_b7: \update.vbs
                    • 0x6422c:$str_b9: Downloaded file:
                    • 0x64218:$str_b10: Downloading file:
                    • 0x642bc:$str_b12: Failed to upload file:
                    • 0x65004:$str_b13: StartForward
                    • 0x65024:$str_b14: StopForward
                    • 0x64ad8:$str_b15: fso.DeleteFile "
                    • 0x64a6c:$str_b16: On Error Resume Next
                    • 0x64b08:$str_b17: fso.DeleteFolder "
                    • 0x642ac:$str_b18: Uploaded file:
                    • 0x6426c:$str_b19: Unable to delete:
                    • 0x64aa0:$str_b20: while fso.FileExists("
                    • 0x64749:$str_c0: [Firefox StoredLogins not found]
                    Click to see the 29 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe", ParentImage: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe, ParentProcessId: 6840, ParentProcessName: ORDER AND SPECIFICATIONS.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe", ProcessId: 7084, ProcessName: powershell.exe
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\ProgramData\Remcos\remcos.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe, ProcessId: 7076, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-YJ70D0
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe", ParentImage: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe, ParentProcessId: 6840, ParentProcessName: ORDER AND SPECIFICATIONS.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe", ProcessId: 7084, ProcessName: powershell.exe
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\ProgramData\Remcos\remcos.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe, ProcessId: 7076, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-YJ70D0
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe", ParentImage: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe, ParentProcessId: 6840, ParentProcessName: ORDER AND SPECIFICATIONS.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe", ProcessId: 7084, ProcessName: powershell.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Registry Key setAuthor: Joe Security: Data: Details: CF 05 57 11 D1 19 15 2F ED AD BD 0C 51 F6 56 EA 16 8C D8 AD F1 C3 AA 03 F1 72 38 76 24 96 40 4B 0B 2F E5 43 12 D7 A8 C0 5C CB A9 E3 17 E7 FB 8B FC AC AE DA EE 9E A6 B1 18 AC 8E 4C 20 2A B5 0D 9E 23 , EventID: 13, EventType: SetValue, Image: C:\ProgramData\Remcos\remcos.exe, ProcessId: 2144, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-YJ70D0\exepath
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-21T08:56:15.448674+010020365941Malware Command and Control Activity Detected192.168.2.449732154.216.16.546092TCP
                    2024-11-21T08:56:33.025323+010020365941Malware Command and Control Activity Detected192.168.2.449740154.216.16.546092TCP
                    2024-11-21T08:56:33.181553+010020365941Malware Command and Control Activity Detected192.168.2.449741154.216.16.546092TCP
                    2024-11-21T08:56:35.462838+010020365941Malware Command and Control Activity Detected192.168.2.449742154.216.16.546092TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-21T08:56:18.131083+010028033043Unknown Traffic192.168.2.449734178.237.33.5080TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 00000011.00000002.1921104180.00000000010B7000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["16.54:6092:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-YJ70D0", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Enable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                    Source: C:\ProgramData\Remcos\remcos.exeReversingLabs: Detection: 39%
                    Source: ORDER AND SPECIFICATIONS.scr.exeReversingLabs: Detection: 39%
                    Source: ORDER AND SPECIFICATIONS.scr.exeVirustotal: Detection: 45%Perma Link
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.1724701599.0000000000C3A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.1921104180.00000000010B7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.2956392919.0000000001417000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2000409352.00000000010C7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1736104866.0000000000CD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.2957635105.000000000304F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726400682.0000000004515000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726400682.0000000003A09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 6840, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 7076, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 2144, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5888, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 2496, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3512, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\Remcos\logs.dat, type: DROPPED
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\ProgramData\Remcos\remcos.exeJoe Sandbox ML: detected
                    Source: ORDER AND SPECIFICATIONS.scr.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,3_2_0043293A
                    Source: ORDER AND SPECIFICATIONS.scr.exe, 00000000.00000002.1726400682.0000000003A09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_ea920cf0-8

                    Exploits

                    barindex
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726400682.0000000004515000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726400682.0000000003A09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 6840, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 7076, type: MEMORYSTR

                    Privilege Escalation

                    barindex
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00406764 _wcslen,CoGetObject,3_2_00406764
                    Source: ORDER AND SPECIFICATIONS.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: ORDER AND SPECIFICATIONS.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: iwOt.pdb source: ORDER AND SPECIFICATIONS.scr.exe, remcos.exe.3.dr
                    Source: Binary string: iwOt.pdbSHA256 source: ORDER AND SPECIFICATIONS.scr.exe, remcos.exe.3.dr
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0040B335
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,3_2_0041B42F
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0040B53A
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,3_2_004089A9
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00406AC2 FindFirstFileW,FindNextFileW,3_2_00406AC2
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,3_2_00407A8C
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_00418C69
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,3_2_00408DA7
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,3_2_00406F06

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49732 -> 154.216.16.54:6092
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49741 -> 154.216.16.54:6092
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49742 -> 154.216.16.54:6092
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49740 -> 154.216.16.54:6092
                    Source: Malware configuration extractorURLs: 16.54
                    Source: global trafficTCP traffic: 192.168.2.4:49732 -> 154.216.16.54:6092
                    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                    Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                    Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
                    Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49734 -> 178.237.33.50:80
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.54
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_004260F7 recv,3_2_004260F7
                    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                    Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                    Source: ORDER AND SPECIFICATIONS.scr.exe, 00000003.00000002.1724701599.0000000000C50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMO
                    Source: ORDER AND SPECIFICATIONS.scr.exe, remcos.exe.3.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                    Source: ORDER AND SPECIFICATIONS.scr.exe, remcos.exe.3.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                    Source: ORDER AND SPECIFICATIONS.scr.exe, remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                    Source: ORDER AND SPECIFICATIONS.scr.exe, 00000000.00000002.1726400682.0000000003A09000.00000004.00000800.00020000.00000000.sdmp, ORDER AND SPECIFICATIONS.scr.exe, 00000000.00000002.1726400682.0000000004515000.00000004.00000800.00020000.00000000.sdmp, ORDER AND SPECIFICATIONS.scr.exe, 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpi8)
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpn;
                    Source: remcos.exe, 0000000B.00000002.2959871045.0000000005B90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iptc.orgxm
                    Source: remcos.exe, 0000000B.00000002.2959871045.0000000005B90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.0
                    Source: remcos.exe, 0000000B.00000002.2959871045.0000000005B90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.xa
                    Source: ORDER AND SPECIFICATIONS.scr.exe, remcos.exe.3.drString found in binary or memory: http://ocsp.comodoca.com0
                    Source: ORDER AND SPECIFICATIONS.scr.exe, 00000000.00000002.1725661879.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 00000004.00000002.1742567144.0000000002FB5000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000000A.00000002.1842092650.0000000003151000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000000F.00000002.1923273343.00000000034B8000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 00000012.00000002.2002757530.0000000002858000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: ORDER AND SPECIFICATIONS.scr.exe, remcos.exe.3.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_004099E4 SetWindowsHookExA 0000000D,004099D0,000000003_2_004099E4
                    Source: C:\ProgramData\Remcos\remcos.exeWindows user hook set: 0 keyboard low level C:\ProgramData\Remcos\remcos.exe
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_004159C6
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_004159C6
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_004159C6
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,3_2_00409B10
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726400682.0000000004515000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726400682.0000000003A09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 6840, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 7076, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5812, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3264, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3140, type: MEMORYSTR

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.1724701599.0000000000C3A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.1921104180.00000000010B7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.2956392919.0000000001417000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2000409352.00000000010C7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1736104866.0000000000CD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.2957635105.000000000304F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726400682.0000000004515000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726400682.0000000003A09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 6840, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 7076, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 2144, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5888, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 2496, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3512, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\Remcos\logs.dat, type: DROPPED

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0041BB71 SystemParametersInfoW,3_2_0041BB71
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0041BB77 SystemParametersInfoW,3_2_0041BB77

                    System Summary

                    barindex
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000000.00000002.1726400682.0000000004515000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000000.00000002.1726400682.0000000003A09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 6840, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 7076, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: initial sampleStatic PE information: Filename: ORDER AND SPECIFICATIONS.scr.exe
                    Source: C:\ProgramData\Remcos\remcos.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,3_2_004158B9
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 0_2_0299D55C0_2_0299D55C
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 0_2_04F967E00_2_04F967E0
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 0_2_04F9E8580_2_04F9E858
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 0_2_04F967D20_2_04F967D2
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 0_2_04F9D7890_2_04F9D789
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 0_2_04F900400_2_04F90040
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 0_2_04F9001C0_2_04F9001C
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 0_2_04F9C1540_2_04F9C154
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0041D0713_2_0041D071
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_004520D23_2_004520D2
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0043D0983_2_0043D098
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_004371503_2_00437150
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_004361AA3_2_004361AA
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_004262543_2_00426254
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_004313773_2_00431377
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0043651C3_2_0043651C
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0041E5DF3_2_0041E5DF
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0044C7393_2_0044C739
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_004367C63_2_004367C6
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_004267CB3_2_004267CB
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0043C9DD3_2_0043C9DD
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00432A493_2_00432A49
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00436A8D3_2_00436A8D
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0043CC0C3_2_0043CC0C
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00436D483_2_00436D48
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00434D223_2_00434D22
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00426E733_2_00426E73
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00440E203_2_00440E20
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0043CE3B3_2_0043CE3B
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00412F453_2_00412F45
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00452F003_2_00452F00
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00426FAD3_2_00426FAD
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 4_2_0166D55C4_2_0166D55C
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 4_2_05B27A384_2_05B27A38
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 4_2_05B21D084_2_05B21D08
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 4_2_05B23D604_2_05B23D60
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 4_2_05B23D4F4_2_05B23D4F
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 4_2_05B214984_2_05B21498
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 4_2_05B214624_2_05B21462
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 4_2_05B221304_2_05B22130
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 4_2_05B221404_2_05B22140
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 4_2_05B218D04_2_05B218D0
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 4_2_05B218C14_2_05B218C1
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 4_2_061321064_2_06132106
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 4_2_061334B84_2_061334B8
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 4_2_061334A74_2_061334A7
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 4_2_061399504_2_06139950
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 4_2_061399604_2_06139960
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 10_2_0141D55C10_2_0141D55C
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 15_2_0177D55C15_2_0177D55C
                    Source: C:\ProgramData\Remcos\remcos.exeCode function: 18_2_00F2D55C18_2_00F2D55C
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: String function: 00401F66 appears 50 times
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: String function: 004020E7 appears 39 times
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: String function: 004338A5 appears 41 times
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: String function: 00433FB0 appears 55 times
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5888 -s 1980
                    Source: ORDER AND SPECIFICATIONS.scr.exeStatic PE information: invalid certificate
                    Source: ORDER AND SPECIFICATIONS.scr.exe, 00000000.00000002.1734711693.0000000005D20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs ORDER AND SPECIFICATIONS.scr.exe
                    Source: ORDER AND SPECIFICATIONS.scr.exe, 00000000.00000002.1726400682.0000000003A09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs ORDER AND SPECIFICATIONS.scr.exe
                    Source: ORDER AND SPECIFICATIONS.scr.exe, 00000000.00000002.1717529648.0000000000DFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ORDER AND SPECIFICATIONS.scr.exe
                    Source: ORDER AND SPECIFICATIONS.scr.exe, 00000000.00000000.1697460194.00000000006F5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameiwOt.exe: vs ORDER AND SPECIFICATIONS.scr.exe
                    Source: ORDER AND SPECIFICATIONS.scr.exe, 00000000.00000002.1731734994.0000000005260000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs ORDER AND SPECIFICATIONS.scr.exe
                    Source: ORDER AND SPECIFICATIONS.scr.exe, 00000000.00000002.1733533133.0000000005B42000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs ORDER AND SPECIFICATIONS.scr.exe
                    Source: ORDER AND SPECIFICATIONS.scr.exe, 00000000.00000002.1725661879.0000000002A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs ORDER AND SPECIFICATIONS.scr.exe
                    Source: ORDER AND SPECIFICATIONS.scr.exe, 00000003.00000002.1724701599.0000000000C50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameiwOt.exe: vs ORDER AND SPECIFICATIONS.scr.exe
                    Source: ORDER AND SPECIFICATIONS.scr.exeBinary or memory string: OriginalFilenameiwOt.exe: vs ORDER AND SPECIFICATIONS.scr.exe
                    Source: ORDER AND SPECIFICATIONS.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000000.00000002.1726400682.0000000004515000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000000.00000002.1726400682.0000000003A09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 6840, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 7076, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: ORDER AND SPECIFICATIONS.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: remcos.exe.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, R3LI2JlBQK2y8eTkWd.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, R3LI2JlBQK2y8eTkWd.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, R3LI2JlBQK2y8eTkWd.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, yeQg4VjmhhFXIWIfLn.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, yeQg4VjmhhFXIWIfLn.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, R3LI2JlBQK2y8eTkWd.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, R3LI2JlBQK2y8eTkWd.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, R3LI2JlBQK2y8eTkWd.csSecurity API names: _0020.AddAccessRule
                    Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@30/19@1/2
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,3_2_00416AB7
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,3_2_0040E219
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0041A63F FindResourceA,LoadResource,LockResource,SizeofResource,3_2_0041A63F
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_00419BC4
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ORDER AND SPECIFICATIONS.scr.exe.logJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMutant created: NULL
                    Source: C:\ProgramData\Remcos\remcos.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-YJ70D0
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7088:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5640:120:WilError_03
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5888
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kqkj5rvy.14m.ps1Jump to behavior
                    Source: ORDER AND SPECIFICATIONS.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: ORDER AND SPECIFICATIONS.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: ORDER AND SPECIFICATIONS.scr.exeReversingLabs: Detection: 39%
                    Source: ORDER AND SPECIFICATIONS.scr.exeVirustotal: Detection: 45%
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeFile read: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe"
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess created: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe"
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "c:\program files (x86)\internet explorer\iexplore.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: unknownProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: unknownProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: unknownProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5888 -s 1980
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess created: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe" Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Remcos\remcos.exe"Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "c:\program files (x86)\internet explorer\iexplore.exe"Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: version.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: slc.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: version.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: winmm.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: urlmon.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wininet.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: iertutil.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: srvcli.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: netutils.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: iphlpapi.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: sspicli.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: mswsock.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: uxtheme.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: cryptsp.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: rsaenh.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: cryptbase.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: windows.storage.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wldp.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: profapi.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: kernel.appcore.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: winhttp.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: winnsi.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: dnsapi.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: rasadhlp.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: fwpuclnt.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: windowscodecs.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: mscoree.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: kernel.appcore.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: version.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: uxtheme.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: windows.storage.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wldp.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: profapi.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: cryptsp.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: rsaenh.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: cryptbase.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: amsi.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: userenv.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: msasn1.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: gpapi.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: windowscodecs.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: winmm.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: urlmon.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wininet.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: iertutil.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: srvcli.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: netutils.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: iphlpapi.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: kernel.appcore.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: mscoree.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: kernel.appcore.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: version.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: uxtheme.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: windows.storage.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wldp.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: profapi.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: cryptsp.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: rsaenh.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: cryptbase.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: amsi.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: userenv.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: msasn1.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: gpapi.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: windowscodecs.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: winmm.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: urlmon.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wininet.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: iertutil.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: srvcli.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: netutils.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: iphlpapi.dll
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: ORDER AND SPECIFICATIONS.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: ORDER AND SPECIFICATIONS.scr.exeStatic file information: File size 1231368 > 1048576
                    Source: ORDER AND SPECIFICATIONS.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: ORDER AND SPECIFICATIONS.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: iwOt.pdb source: ORDER AND SPECIFICATIONS.scr.exe, remcos.exe.3.dr
                    Source: Binary string: iwOt.pdbSHA256 source: ORDER AND SPECIFICATIONS.scr.exe, remcos.exe.3.dr

                    Data Obfuscation

                    barindex
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, R3LI2JlBQK2y8eTkWd.cs.Net Code: OEd7XNGEJw System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, R3LI2JlBQK2y8eTkWd.cs.Net Code: OEd7XNGEJw System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,3_2_0041BCE3
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_004567E0 push eax; ret 3_2_004567FE
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0045B9DD push esi; ret 3_2_0045B9E6
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00455EAF push ecx; ret 3_2_00455EC2
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00433FF6 push ecx; ret 3_2_00434009
                    Source: ORDER AND SPECIFICATIONS.scr.exeStatic PE information: section name: .text entropy: 7.896990214277132
                    Source: remcos.exe.3.drStatic PE information: section name: .text entropy: 7.896990214277132
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, CM1SvK5aHRBmoIilg5d.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'kPYqvUiJXo', 'crhq1BOKfb', 'BdmqSUZ0Yc', 'TA0qrtKtnr', 'Lv5qF2nNCv', 'l2Bq6T43nQ', 'EHgqxEktXh'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, aFKh0AkOviDq79TlMZ.csHigh entropy of concatenated method names: 'Ah9ZncdykC', 'OokZuO7bV3', 'C3bD9bUpUi', 'wi3Dtj4ce6', 'Q9rDwCyrkx', 'BchDWREurj', 'BocDPYidkW', 'KFZD2CEm07', 'LLZDgFPs16', 'C0PDbUrg5P'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, XMHDskxNcMKySahmy5.csHigh entropy of concatenated method names: 'chtQTEPh0d', 'ewRQMgTCsV', 'ToString', 'DB6QAbFSRX', 'jrBQdpRnjN', 'puFQDJlLAb', 'YC1QZeYj9t', 'DgMQGn4QGf', 'FMyQYYhKo1', 'tZEQl8Ou9K'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, WS66AxRbRfhg7WgBoK.csHigh entropy of concatenated method names: 'Gk6qDfVJBJ', 'e6bqZYRSK8', 'nfnqGEU43n', 'nAyqYS7O1N', 'apfqilAN4U', 'VZSqlenS14', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, PgcKGFgyrKLjswocpR.csHigh entropy of concatenated method names: 'QsnYKSvaXw', 'yV4YJTQ4lc', 'fC5YXvV48E', 'SO5YHtJFRd', 'dkpYnirPpY', 'L5PY41d8hS', 'tXcYut3sNj', 'emPYj7CI0b', 'kxWYIVOv1F', 'Y6BYkXhqqi'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, yeQg4VjmhhFXIWIfLn.csHigh entropy of concatenated method names: 'uGKdrvck7G', 'umqdFvNdO8', 'L8xd6Uv3Pv', 'bvJdxCQofk', 'xWIdhmO9r8', 'IVddBCC0S4', 'tPxdcPS2nL', 'NBrd0WXN8Y', 'Vghd3I1PV3', 'yShdRNUQMP'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, WqsZDfUjB3PQ43Mfrn.csHigh entropy of concatenated method names: 'OMnGNndbjr', 'EnoGdAnQ7n', 'UShGZCqatj', 'wwgGYc5J6b', 'jTEGlFCeb1', 'ulRZh4spRm', 'qb8ZB0Zio6', 'PRIZccGoTw', 'OMXZ0V2CrU', 'YwqZ3mpuGZ'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, EFific5pTYlS4eZ1SmV.csHigh entropy of concatenated method names: 'ToString', 'opROjYVAH3', 'lhLOI5EAoF', 'bYjOkSJQvD', 'NvsOUMLasY', 'zuAOmexJrF', 'K15O9blhCc', 'LK4OtaPJPK', 'WfINoxmJLqSVMACFm2q', 'l7VnRjmMqPMEr0Iecmb'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, GLI6qy7bQZrIGiQRfp.csHigh entropy of concatenated method names: 'BKJ5YeQg4V', 'Ghh5lFXIWI', 'Nre5TjC4Yi', 'sFg5M2aFKh', 'HTl5oMZ0qs', 'hDf5yjB3PQ', 'EEQoGcM0monefyTpdk', 'Fxk8hmdsFCX1nW1Hfv', 'hfA55pMggy', 'aAa5VqL9PO'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, lgbkisB8yo6f8s309s.csHigh entropy of concatenated method names: 'CkxQ0KroLZ', 'FpjQR4bOJT', 'gAnfanHkO3', 'X7of5i0HNx', 'flUQvJoCQE', 'T9eQ1IFUFY', 'tojQSyCJ8R', 'y1OQr868XW', 'BxgQF4rKr5', 'l0jQ6Ehn7o'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, FqKhtQ3CAUQFEjJpoy.csHigh entropy of concatenated method names: 'UPuiU7yqew', 'AEDimWMG8U', 'xOOi9ILojN', 'u1AitUkV1r', 'l8GiwjtyXI', 'AyyiWrAHW8', 'ixAiPdws96', 'pKxi2Jr2Ad', 'ocQigGOMUZ', 'fW7ibMjxcm'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, R3LI2JlBQK2y8eTkWd.csHigh entropy of concatenated method names: 'zgUVNBaOYP', 't0EVA0silE', 'ldCVdXXc8X', 'MISVDMZKjM', 'xYvVZOeqXf', 'vQbVGHgSDW', 'nBNVYssbKB', 'afpVlVr8Bq', 'oTAVe1uil4', 'FVbVT4ihlJ'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, Hir1agIrejC4YiiFg2.csHigh entropy of concatenated method names: 'TMRDHMDW4f', 'PMyD4N9NDk', 'QCwDjGSxdr', 'vKFDINr16i', 'FO9DooRS3t', 'uuFDyC9trZ', 'ei9DQwntON', 'm9nDfFOPyb', 'sZDDiFp7lk', 'LO7DqUNCP9'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, Qa1aIySOtIRN9xbRsE.csHigh entropy of concatenated method names: 'G95sjr9je9', 'upUsIVlI7T', 'zWnsU5g4HT', 'gROsmTTxdk', 'Qv7ste9Yih', 'SEVswIcdr5', 'KB0sPVdZtU', 'W9ms2nV4Xg', 'Yr2sbhAZv8', 'PgVsvassex'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, k1r20Jc2DdECPO5mmR.csHigh entropy of concatenated method names: 'WrBionjGkD', 'i3niQOj57v', 'yPRiiUNbRZ', 'za7iOP4t80', 'M8kiCPT3Lx', 'XLYiEyv60P', 'Dispose', 'rgvfA7aWYh', 'VlkfdS1TfD', 'g4OfD2XC67'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, Rl1aSm57RNmZGAmDlj6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'EiiLicQpOJ', 'tHsLqRm2Bp', 'R5CLO8TMPm', 'cCRLLKVT6M', 'mxZLCy7FpH', 'GwYL8P6GU4', 'AbILEY43Um'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, XkHHP1PXcMexuadJ6m.csHigh entropy of concatenated method names: 'VEVYAAUCwF', 'DfpYD4VoeD', 'sBXYGkkQF8', 'iWTGRfxZcO', 'P2RGzaILoU', 'dOOYaHIHZR', 'GumY5SyLls', 'iqqYpCQvsm', 'zdpYVRhCcM', 'fl9Y7OvRGs'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, QlpM4AzDEVrHsjvFGv.csHigh entropy of concatenated method names: 'aPVq4UT5Jb', 'EFYqjLd1Xh', 'b5oqIMrShr', 'qmnqUM5tP3', 'm9Jqmpk1rB', 'kWxqtBK25G', 'd5LqwnlAIL', 'VaxqEfFQ5s', 'kO1qKeMUU4', 'iVqqJE9GhY'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, h896RSppyvh7vnsuSB.csHigh entropy of concatenated method names: 'IvtXS1a1C', 'BjVHtNuZn', 'KXP48aBcn', 'HspunnNcr', 'H5yIiT4ek', 'TvdkWaRgh', 'UC0flqAp3QV3wFHyLL', 'XCAnXBXhv26L5aIp37', 'rNefDdPG7', 'FdfqmMc87'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, Gd5w0hdOJudD7IjOMP.csHigh entropy of concatenated method names: 'Dispose', 'gEC53PO5mm', 'AZkpmmjg08', 'TZcLhfaEIm', 'YKS5RCAvFa', 'sI85zmwKW8', 'ProcessDialogKey', 'PokpaqKhtQ', 'vAUp5QFEjJ', 'coyppcS66A'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3b8f658.1.raw.unpack, W28QPp551uMj0qaJcaa.csHigh entropy of concatenated method names: 'VhIqRCvQ6c', 'estqz3qnSN', 'DcZOaCkiRU', 'mSGO5wM5IT', 'xenOpJ8b72', 'GEHOVDh3CC', 'Gr5O7jBVOi', 'jA1ONocI4Q', 'hDAOAraOcU', 'u2JOdbBRvB'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, CM1SvK5aHRBmoIilg5d.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'kPYqvUiJXo', 'crhq1BOKfb', 'BdmqSUZ0Yc', 'TA0qrtKtnr', 'Lv5qF2nNCv', 'l2Bq6T43nQ', 'EHgqxEktXh'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, aFKh0AkOviDq79TlMZ.csHigh entropy of concatenated method names: 'Ah9ZncdykC', 'OokZuO7bV3', 'C3bD9bUpUi', 'wi3Dtj4ce6', 'Q9rDwCyrkx', 'BchDWREurj', 'BocDPYidkW', 'KFZD2CEm07', 'LLZDgFPs16', 'C0PDbUrg5P'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, XMHDskxNcMKySahmy5.csHigh entropy of concatenated method names: 'chtQTEPh0d', 'ewRQMgTCsV', 'ToString', 'DB6QAbFSRX', 'jrBQdpRnjN', 'puFQDJlLAb', 'YC1QZeYj9t', 'DgMQGn4QGf', 'FMyQYYhKo1', 'tZEQl8Ou9K'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, WS66AxRbRfhg7WgBoK.csHigh entropy of concatenated method names: 'Gk6qDfVJBJ', 'e6bqZYRSK8', 'nfnqGEU43n', 'nAyqYS7O1N', 'apfqilAN4U', 'VZSqlenS14', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, PgcKGFgyrKLjswocpR.csHigh entropy of concatenated method names: 'QsnYKSvaXw', 'yV4YJTQ4lc', 'fC5YXvV48E', 'SO5YHtJFRd', 'dkpYnirPpY', 'L5PY41d8hS', 'tXcYut3sNj', 'emPYj7CI0b', 'kxWYIVOv1F', 'Y6BYkXhqqi'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, yeQg4VjmhhFXIWIfLn.csHigh entropy of concatenated method names: 'uGKdrvck7G', 'umqdFvNdO8', 'L8xd6Uv3Pv', 'bvJdxCQofk', 'xWIdhmO9r8', 'IVddBCC0S4', 'tPxdcPS2nL', 'NBrd0WXN8Y', 'Vghd3I1PV3', 'yShdRNUQMP'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, WqsZDfUjB3PQ43Mfrn.csHigh entropy of concatenated method names: 'OMnGNndbjr', 'EnoGdAnQ7n', 'UShGZCqatj', 'wwgGYc5J6b', 'jTEGlFCeb1', 'ulRZh4spRm', 'qb8ZB0Zio6', 'PRIZccGoTw', 'OMXZ0V2CrU', 'YwqZ3mpuGZ'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, EFific5pTYlS4eZ1SmV.csHigh entropy of concatenated method names: 'ToString', 'opROjYVAH3', 'lhLOI5EAoF', 'bYjOkSJQvD', 'NvsOUMLasY', 'zuAOmexJrF', 'K15O9blhCc', 'LK4OtaPJPK', 'WfINoxmJLqSVMACFm2q', 'l7VnRjmMqPMEr0Iecmb'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, GLI6qy7bQZrIGiQRfp.csHigh entropy of concatenated method names: 'BKJ5YeQg4V', 'Ghh5lFXIWI', 'Nre5TjC4Yi', 'sFg5M2aFKh', 'HTl5oMZ0qs', 'hDf5yjB3PQ', 'EEQoGcM0monefyTpdk', 'Fxk8hmdsFCX1nW1Hfv', 'hfA55pMggy', 'aAa5VqL9PO'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, lgbkisB8yo6f8s309s.csHigh entropy of concatenated method names: 'CkxQ0KroLZ', 'FpjQR4bOJT', 'gAnfanHkO3', 'X7of5i0HNx', 'flUQvJoCQE', 'T9eQ1IFUFY', 'tojQSyCJ8R', 'y1OQr868XW', 'BxgQF4rKr5', 'l0jQ6Ehn7o'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, FqKhtQ3CAUQFEjJpoy.csHigh entropy of concatenated method names: 'UPuiU7yqew', 'AEDimWMG8U', 'xOOi9ILojN', 'u1AitUkV1r', 'l8GiwjtyXI', 'AyyiWrAHW8', 'ixAiPdws96', 'pKxi2Jr2Ad', 'ocQigGOMUZ', 'fW7ibMjxcm'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, R3LI2JlBQK2y8eTkWd.csHigh entropy of concatenated method names: 'zgUVNBaOYP', 't0EVA0silE', 'ldCVdXXc8X', 'MISVDMZKjM', 'xYvVZOeqXf', 'vQbVGHgSDW', 'nBNVYssbKB', 'afpVlVr8Bq', 'oTAVe1uil4', 'FVbVT4ihlJ'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, Hir1agIrejC4YiiFg2.csHigh entropy of concatenated method names: 'TMRDHMDW4f', 'PMyD4N9NDk', 'QCwDjGSxdr', 'vKFDINr16i', 'FO9DooRS3t', 'uuFDyC9trZ', 'ei9DQwntON', 'm9nDfFOPyb', 'sZDDiFp7lk', 'LO7DqUNCP9'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, Qa1aIySOtIRN9xbRsE.csHigh entropy of concatenated method names: 'G95sjr9je9', 'upUsIVlI7T', 'zWnsU5g4HT', 'gROsmTTxdk', 'Qv7ste9Yih', 'SEVswIcdr5', 'KB0sPVdZtU', 'W9ms2nV4Xg', 'Yr2sbhAZv8', 'PgVsvassex'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, k1r20Jc2DdECPO5mmR.csHigh entropy of concatenated method names: 'WrBionjGkD', 'i3niQOj57v', 'yPRiiUNbRZ', 'za7iOP4t80', 'M8kiCPT3Lx', 'XLYiEyv60P', 'Dispose', 'rgvfA7aWYh', 'VlkfdS1TfD', 'g4OfD2XC67'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, Rl1aSm57RNmZGAmDlj6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'EiiLicQpOJ', 'tHsLqRm2Bp', 'R5CLO8TMPm', 'cCRLLKVT6M', 'mxZLCy7FpH', 'GwYL8P6GU4', 'AbILEY43Um'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, XkHHP1PXcMexuadJ6m.csHigh entropy of concatenated method names: 'VEVYAAUCwF', 'DfpYD4VoeD', 'sBXYGkkQF8', 'iWTGRfxZcO', 'P2RGzaILoU', 'dOOYaHIHZR', 'GumY5SyLls', 'iqqYpCQvsm', 'zdpYVRhCcM', 'fl9Y7OvRGs'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, QlpM4AzDEVrHsjvFGv.csHigh entropy of concatenated method names: 'aPVq4UT5Jb', 'EFYqjLd1Xh', 'b5oqIMrShr', 'qmnqUM5tP3', 'm9Jqmpk1rB', 'kWxqtBK25G', 'd5LqwnlAIL', 'VaxqEfFQ5s', 'kO1qKeMUU4', 'iVqqJE9GhY'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, h896RSppyvh7vnsuSB.csHigh entropy of concatenated method names: 'IvtXS1a1C', 'BjVHtNuZn', 'KXP48aBcn', 'HspunnNcr', 'H5yIiT4ek', 'TvdkWaRgh', 'UC0flqAp3QV3wFHyLL', 'XCAnXBXhv26L5aIp37', 'rNefDdPG7', 'FdfqmMc87'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, Gd5w0hdOJudD7IjOMP.csHigh entropy of concatenated method names: 'Dispose', 'gEC53PO5mm', 'AZkpmmjg08', 'TZcLhfaEIm', 'YKS5RCAvFa', 'sI85zmwKW8', 'ProcessDialogKey', 'PokpaqKhtQ', 'vAUp5QFEjJ', 'coyppcS66A'
                    Source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.5d20000.5.raw.unpack, W28QPp551uMj0qaJcaa.csHigh entropy of concatenated method names: 'VhIqRCvQ6c', 'estqz3qnSN', 'DcZOaCkiRU', 'mSGO5wM5IT', 'xenOpJ8b72', 'GEHOVDh3CC', 'Gr5O7jBVOi', 'jA1ONocI4Q', 'hDAOAraOcU', 'u2JOdbBRvB'
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00406128 ShellExecuteW,URLDownloadToFileW,3_2_00406128
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeFile created: C:\ProgramData\Remcos\remcos.exeJump to dropped file
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeFile created: C:\ProgramData\Remcos\remcos.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rmc-YJ70D0Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_00419BC4
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rmc-YJ70D0Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rmc-YJ70D0Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Rmc-YJ70D0Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Rmc-YJ70D0Jump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,3_2_0041BCE3
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 6840, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5812, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3264, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3140, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0040E54F Sleep,ExitProcess,3_2_0040E54F
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeMemory allocated: 1070000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeMemory allocated: 2A00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeMemory allocated: 4A00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeMemory allocated: 6210000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeMemory allocated: 7210000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeMemory allocated: 7360000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeMemory allocated: 8360000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 15F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 2F40000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 4F40000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 68F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 78F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 7A40000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 8A40000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 1410000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 3100000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 5100000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 6910000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 7910000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 7A60000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 8A60000 memory reserve | memory write watchJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 1770000 memory reserve | memory write watch
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 3440000 memory reserve | memory write watch
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 5440000 memory reserve | memory write watch
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 6B00000 memory reserve | memory write watch
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 7B00000 memory reserve | memory write watch
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 7C40000 memory reserve | memory write watch
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 8C40000 memory reserve | memory write watch
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: F20000 memory reserve | memory write watch
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 27E0000 memory reserve | memory write watch
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 25F0000 memory reserve | memory write watch
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 5E80000 memory reserve | memory write watch
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 6E80000 memory reserve | memory write watch
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 6FC0000 memory reserve | memory write watch
                    Source: C:\ProgramData\Remcos\remcos.exeMemory allocated: 7FC0000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,3_2_004198C2
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeThread delayed: delay time: 922337203685477
                    Source: C:\ProgramData\Remcos\remcos.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6011Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2814Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6950Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2631Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeWindow / User API: threadDelayed 9015
                    Source: C:\ProgramData\Remcos\remcos.exeWindow / User API: foregroundWindowGot 1404
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeEvaded block: after key decisiongraph_3-47073
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeEvaded block: after key decisiongraph_3-47047
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeAPI coverage: 5.5 %
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe TID: 6888Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1376Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3140Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exe TID: 5744Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1184Thread sleep count: 6950 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6168Thread sleep count: 2631 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7064Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exe TID: 732Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exe TID: 6528Thread sleep time: -30000s >= -30000s
                    Source: C:\ProgramData\Remcos\remcos.exe TID: 3488Thread sleep time: -714000s >= -30000s
                    Source: C:\ProgramData\Remcos\remcos.exe TID: 3488Thread sleep time: -27045000s >= -30000s
                    Source: C:\ProgramData\Remcos\remcos.exe TID: 4476Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\ProgramData\Remcos\remcos.exe TID: 3412Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0040B335
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,3_2_0041B42F
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0040B53A
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,3_2_004089A9
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00406AC2 FindFirstFileW,FindNextFileW,3_2_00406AC2
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,3_2_00407A8C
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_00418C69
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,3_2_00408DA7
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,3_2_00406F06
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeThread delayed: delay time: 922337203685477
                    Source: C:\ProgramData\Remcos\remcos.exeThread delayed: delay time: 922337203685477
                    Source: remcos.exe, 00000004.00000002.1740692420.00000000013B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}!
                    Source: remcos.exe, 00000004.00000002.1740692420.00000000013B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                    Source: remcos.exe, 0000000B.00000002.2956392919.0000000001417000.00000004.00000020.00020000.00000000.sdmp, remcos.exe, 0000000B.00000002.2956705230.000000000148C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000148C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: ORDER AND SPECIFICATIONS.scr.exe, 00000000.00000002.1723702209.0000000000E7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}EMX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess queried: DebugPort
                    Source: C:\ProgramData\Remcos\remcos.exeProcess queried: DebugPort
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0043A65D
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,3_2_0041BCE3
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00442554 mov eax, dword ptr fs:[00000030h]3_2_00442554
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0044E92E GetProcessHeap,3_2_0044E92E
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00434168
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0043A65D
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00433B44
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00433CD7 SetUnhandledExceptionFilter,3_2_00433CD7
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe"
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe"Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Remcos\remcos.exe"Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeSection loaded: NULL target: C:\Program Files (x86)\Internet Explorer\iexplore.exe protection: execute and read and writeJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 2814008Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe3_2_00410F36
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00418754 mouse_event,3_2_00418754
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess created: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe" Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Remcos\remcos.exe"Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "c:\program files (x86)\internet explorer\iexplore.exe"Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: program managerD0\l
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: program managerD0\hKM
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: program managerr|
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: program managerD0\ Ku
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmp, remcos.exe, 0000000B.00000002.2956392919.0000000001417000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: program managerD0\
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: program managerD0\fK
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerD0\oK
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerD0\PK
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: program manager;?
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager)
                    Source: remcos.exe, 0000000B.00000002.2956392919.0000000001417000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dProgram Manager\logs.dat2
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerD0\
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dProgram Managerg;
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: program managerD0\tK
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: program managerD0\'K|
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dProgram ManagerI;
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: program manager
                    Source: remcos.exe, 0000000B.00000002.2956392919.0000000001417000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerD0\BK
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerc?
                    Source: remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: program managerD0\KK
                    Source: remcos.exe, 0000000B.00000002.2956392919.0000000001417000.00000004.00000020.00020000.00000000.sdmp, logs.dat.11.drBinary or memory string: [Program Manager]
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00433E0A cpuid 3_2_00433E0A
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: EnumSystemLocalesW,3_2_004470AE
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: GetLocaleInfoW,3_2_004510BA
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_004511E3
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: GetLocaleInfoW,3_2_004512EA
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_004513B7
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: GetLocaleInfoW,3_2_00447597
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: GetLocaleInfoA,3_2_0040E679
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,3_2_00450A7F
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: EnumSystemLocalesW,3_2_00450CF7
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: EnumSystemLocalesW,3_2_00450D42
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: EnumSystemLocalesW,3_2_00450DDD
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_00450E6A
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeQueries volume information: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\ProgramData\Remcos\remcos.exe VolumeInformationJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\ProgramData\Remcos\remcos.exe VolumeInformationJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\ProgramData\Remcos\remcos.exe VolumeInformation
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\ProgramData\Remcos\remcos.exe VolumeInformation
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\ProgramData\Remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00434010 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,3_2_00434010
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_0041A7A2 GetUserNameW,3_2_0041A7A2
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: 3_2_00448057 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,3_2_00448057
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.1724701599.0000000000C3A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.1921104180.00000000010B7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.2956392919.0000000001417000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2000409352.00000000010C7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1736104866.0000000000CD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.2957635105.000000000304F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726400682.0000000004515000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726400682.0000000003A09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 6840, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 7076, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 2144, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5888, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 2496, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3512, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\Remcos\logs.dat, type: DROPPED
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data3_2_0040B21B
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\3_2_0040B335
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: \key3.db3_2_0040B335

                    Remote Access Functionality

                    barindex
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-YJ70D0Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-YJ70D0Jump to behavior
                    Source: C:\ProgramData\Remcos\remcos.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-YJ70D0
                    Source: C:\ProgramData\Remcos\remcos.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-YJ70D0
                    Source: C:\ProgramData\Remcos\remcos.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-YJ70D0
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.4515a60.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.ORDER AND SPECIFICATIONS.scr.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER AND SPECIFICATIONS.scr.exe.3ad2c38.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.1724701599.0000000000C3A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.1921104180.00000000010B7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.2956392919.0000000001417000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2000409352.00000000010C7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.1736104866.0000000000CD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.2957635105.000000000304F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726400682.0000000004515000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726400682.0000000003A09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 6840, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ORDER AND SPECIFICATIONS.scr.exe PID: 7076, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 2144, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5888, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 2496, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3512, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\Remcos\logs.dat, type: DROPPED
                    Source: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exeCode function: cmd.exe3_2_00405042
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    12
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Command and Scripting Interpreter
                    1
                    Windows Service
                    1
                    Bypass User Account Control
                    1
                    Deobfuscate/Decode Files or Information
                    211
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol211
                    Input Capture
                    2
                    Encrypted Channel
                    Exfiltration Over Bluetooth1
                    Defacement
                    Email AddressesDNS ServerDomain Accounts2
                    Service Execution
                    11
                    Registry Run Keys / Startup Folder
                    1
                    Access Token Manipulation
                    3
                    Obfuscated Files or Information
                    2
                    Credentials In Files
                    1
                    System Service Discovery
                    SMB/Windows Admin Shares3
                    Clipboard Data
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                    Windows Service
                    12
                    Software Packing
                    NTDS3
                    File and Directory Discovery
                    Distributed Component Object ModelInput Capture1
                    Remote Access Software
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script222
                    Process Injection
                    1
                    DLL Side-Loading
                    LSA Secrets33
                    System Information Discovery
                    SSHKeylogging2
                    Non-Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts11
                    Registry Run Keys / Startup Folder
                    1
                    Bypass User Account Control
                    Cached Domain Credentials131
                    Security Software Discovery
                    VNCGUI Input Capture12
                    Application Layer Protocol
                    Data Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Masquerading
                    DCSync41
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job41
                    Virtualization/Sandbox Evasion
                    Proc Filesystem3
                    Process Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Access Token Manipulation
                    /etc/passwd and /etc/shadow1
                    Application Window Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron222
                    Process Injection
                    Network Sniffing1
                    System Owner/User Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1559970 Sample: ORDER AND SPECIFICATIONS.scr.exe Startdate: 21/11/2024 Architecture: WINDOWS Score: 100 63 geoplugin.net 2->63 69 Suricata IDS alerts for network traffic 2->69 71 Found malware configuration 2->71 73 Malicious sample detected (through community Yara rule) 2->73 75 18 other signatures 2->75 10 ORDER AND SPECIFICATIONS.scr.exe 4 2->10         started        14 remcos.exe 2 2->14         started        16 remcos.exe 2->16         started        18 remcos.exe 2->18         started        signatures3 process4 file5 61 C:\...\ORDER AND SPECIFICATIONS.scr.exe.log, ASCII 10->61 dropped 91 Adds a directory exclusion to Windows Defender 10->91 20 ORDER AND SPECIFICATIONS.scr.exe 2 4 10->20         started        24 powershell.exe 23 10->24         started        26 remcos.exe 14->26         started        29 remcos.exe 16->29         started        31 remcos.exe 16->31         started        33 remcos.exe 18->33         started        35 remcos.exe 18->35         started        signatures6 process7 dnsIp8 55 C:\ProgramData\Remcos\remcos.exe, PE32 20->55 dropped 57 C:\ProgramData\...\remcos.exe:Zone.Identifier, ASCII 20->57 dropped 77 Detected Remcos RAT 20->77 79 Creates autostart registry keys with suspicious names 20->79 37 remcos.exe 4 20->37         started        81 Loading BitLocker PowerShell Module 24->81 40 conhost.exe 24->40         started        65 154.216.16.54, 49732, 49740, 49741 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 26->65 67 geoplugin.net 178.237.33.50, 49734, 80 ATOM86-ASATOM86NL Netherlands 26->67 59 C:\ProgramData\Remcos\logs.dat, data 26->59 dropped 83 Installs a global keyboard hook 26->83 42 WerFault.exe 26->42         started        file9 signatures10 process11 signatures12 85 Multi AV Scanner detection for dropped file 37->85 87 Machine Learning detection for dropped file 37->87 89 Adds a directory exclusion to Windows Defender 37->89 44 remcos.exe 2 1 37->44         started        47 powershell.exe 23 37->47         started        process13 signatures14 93 Detected Remcos RAT 44->93 95 Writes to foreign memory regions 44->95 97 Maps a DLL or memory area into another process 44->97 49 iexplore.exe 44->49         started        99 Loading BitLocker PowerShell Module 47->99 51 WmiPrvSE.exe 47->51         started        53 conhost.exe 47->53         started        process15

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    ORDER AND SPECIFICATIONS.scr.exe39%ReversingLabs
                    ORDER AND SPECIFICATIONS.scr.exe46%VirustotalBrowse
                    ORDER AND SPECIFICATIONS.scr.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\ProgramData\Remcos\remcos.exe100%Joe Sandbox ML
                    C:\ProgramData\Remcos\remcos.exe39%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    16.540%Avira URL Cloudsafe
                    http://iptc.orgxm0%Avira URL Cloudsafe
                    http://ns.xa0%Avira URL Cloudsafe
                    http://ns.adobe.00%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    geoplugin.net
                    178.237.33.50
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://geoplugin.net/json.gpfalse
                        high
                        16.54true
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://geoplugin.net/json.gpn;remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://ns.xaremcos.exe, 0000000B.00000002.2959871045.0000000005B90000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://geoplugin.net/json.gpi8)remcos.exe, 0000000B.00000002.2956705230.000000000144A000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://geoplugin.net/json.gp/CORDER AND SPECIFICATIONS.scr.exe, 00000000.00000002.1726400682.0000000003A09000.00000004.00000800.00020000.00000000.sdmp, ORDER AND SPECIFICATIONS.scr.exe, 00000000.00000002.1726400682.0000000004515000.00000004.00000800.00020000.00000000.sdmp, ORDER AND SPECIFICATIONS.scr.exe, 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                              high
                              http://iptc.orgxmremcos.exe, 0000000B.00000002.2959871045.0000000005B90000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameORDER AND SPECIFICATIONS.scr.exe, 00000000.00000002.1725661879.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 00000004.00000002.1742567144.0000000002FB5000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000000A.00000002.1842092650.0000000003151000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000000F.00000002.1923273343.00000000034B8000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 00000012.00000002.2002757530.0000000002858000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://www.chiark.greenend.org.uk/~sgtatham/putty/0ORDER AND SPECIFICATIONS.scr.exe, remcos.exe.3.drfalse
                                  high
                                  http://ns.adobe.0remcos.exe, 0000000B.00000002.2959871045.0000000005B90000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  154.216.16.54
                                  unknownSeychelles
                                  135357SKHT-ASShenzhenKatherineHengTechnologyInformationCotrue
                                  178.237.33.50
                                  geoplugin.netNetherlands
                                  8455ATOM86-ASATOM86NLfalse
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1559970
                                  Start date and time:2024-11-21 08:55:04 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 7m 48s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:26
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:ORDER AND SPECIFICATIONS.scr.exe
                                  Detection:MAL
                                  Classification:mal100.rans.troj.spyw.expl.evad.winEXE@30/19@1/2
                                  EGA Information:
                                  • Successful, ratio: 85.7%
                                  HCA Information:
                                  • Successful, ratio: 98%
                                  • Number of executed functions: 165
                                  • Number of non-executed functions: 191
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 13.89.179.12
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target remcos.exe, PID 5888 because there are no executed function
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size exceeded maximum capacity and may have missing network information.
                                  • Report size getting too big, too many NtCreateKey calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  02:55:58API Interceptor3x Sleep call for process: ORDER AND SPECIFICATIONS.scr.exe modified
                                  02:56:00API Interceptor566084x Sleep call for process: remcos.exe modified
                                  02:56:01API Interceptor29x Sleep call for process: powershell.exe modified
                                  02:58:04API Interceptor1x Sleep call for process: WerFault.exe modified
                                  07:56:02AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Rmc-YJ70D0 "C:\ProgramData\Remcos\remcos.exe"
                                  07:56:11AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Rmc-YJ70D0 "C:\ProgramData\Remcos\remcos.exe"
                                  07:56:19AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Rmc-YJ70D0 "C:\ProgramData\Remcos\remcos.exe"
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  178.237.33.501732147507ac10953a908ae794c5ee180add9124a78c69705135688e502bb56ce4453da749198.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • geoplugin.net/json.gp
                                  1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • geoplugin.net/json.gp
                                  seethebestthignswhichgivingbestopportunities.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                  • geoplugin.net/json.gp
                                  pi-77159.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                  • geoplugin.net/json.gp
                                  sostener.vbsGet hashmaliciousRemcosBrowse
                                  • geoplugin.net/json.gp
                                  1732086011ea45d03916726c55fa40ae0b8f39b9a24a40da5a5e79d29c703a7fb444bdeb31407.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • geoplugin.net/json.gp
                                  USD470900_COPY_800BLHSBC882001_NOV202024.PDF.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                  • geoplugin.net/json.gp
                                  Pago_BBVA.pdf.bat.exeGet hashmaliciousRemcosBrowse
                                  • geoplugin.net/json.gp
                                  USD470900_COPY_800BLHSBC882001.PDF.batGet hashmaliciousRemcos, DBatLoaderBrowse
                                  • geoplugin.net/json.gp
                                  globe_product_order_korea_buy_20_11_2024_000000000000000000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                  • geoplugin.net/json.gp
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  geoplugin.net1732147507ac10953a908ae794c5ee180add9124a78c69705135688e502bb56ce4453da749198.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • 178.237.33.50
                                  1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • 178.237.33.50
                                  seethebestthignswhichgivingbestopportunities.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                  • 178.237.33.50
                                  pi-77159.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                  • 178.237.33.50
                                  sostener.vbsGet hashmaliciousRemcosBrowse
                                  • 178.237.33.50
                                  1732086011ea45d03916726c55fa40ae0b8f39b9a24a40da5a5e79d29c703a7fb444bdeb31407.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • 178.237.33.50
                                  USD470900_COPY_800BLHSBC882001_NOV202024.PDF.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                  • 178.237.33.50
                                  Pago_BBVA.pdf.bat.exeGet hashmaliciousRemcosBrowse
                                  • 178.237.33.50
                                  USD470900_COPY_800BLHSBC882001.PDF.batGet hashmaliciousRemcos, DBatLoaderBrowse
                                  • 178.237.33.50
                                  globe_product_order_korea_buy_20_11_2024_000000000000000000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                  • 178.237.33.50
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  ATOM86-ASATOM86NL1732147507ac10953a908ae794c5ee180add9124a78c69705135688e502bb56ce4453da749198.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • 178.237.33.50
                                  1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • 178.237.33.50
                                  seethebestthignswhichgivingbestopportunities.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                  • 178.237.33.50
                                  pi-77159.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                  • 178.237.33.50
                                  sostener.vbsGet hashmaliciousRemcosBrowse
                                  • 178.237.33.50
                                  1732086011ea45d03916726c55fa40ae0b8f39b9a24a40da5a5e79d29c703a7fb444bdeb31407.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • 178.237.33.50
                                  USD470900_COPY_800BLHSBC882001_NOV202024.PDF.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                  • 178.237.33.50
                                  Pago_BBVA.pdf.bat.exeGet hashmaliciousRemcosBrowse
                                  • 178.237.33.50
                                  USD470900_COPY_800BLHSBC882001.PDF.batGet hashmaliciousRemcos, DBatLoaderBrowse
                                  • 178.237.33.50
                                  globe_product_order_korea_buy_20_11_2024_000000000000000000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                  • 178.237.33.50
                                  SKHT-ASShenzhenKatherineHengTechnologyInformationCofile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                  • 154.216.19.129
                                  file.exeGet hashmaliciousUnknownBrowse
                                  • 154.216.19.129
                                  file.exeGet hashmaliciousUnknownBrowse
                                  • 154.216.19.129
                                  1732086011ea45d03916726c55fa40ae0b8f39b9a24a40da5a5e79d29c703a7fb444bdeb31407.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                  • 154.216.19.141
                                  dvwkja7.elfGet hashmaliciousMiraiBrowse
                                  • 154.216.16.109
                                  http://www.dvdcollections.co.uk/search/redirect.php?deeplink=https://lp-engenharia.com/zerooo/?email=mwright@burbankca.govGet hashmaliciousHTMLPhisherBrowse
                                  • 154.216.17.193
                                  https://online-e.net/st-manager/click/track?id=795&type=raw&url=https://msc-mu.com/apikey-tyudqnhzdgevhdbasx/secure-redirect%23Darth.Vader%2BDeathStar.com&source_url=https%3A%2F%2Fonline-e.net%2Feven-if-even-though%2F&source_title=Even%20if%E3%81%A8Even%20thoughGet hashmaliciousUnknownBrowse
                                  • 154.216.17.193
                                  new.batGet hashmaliciousUnknownBrowse
                                  • 154.216.17.175
                                  dvwkja7.elfGet hashmaliciousMiraiBrowse
                                  • 154.216.16.109
                                  wnbw86.elfGet hashmaliciousMiraiBrowse
                                  • 154.216.16.109
                                  No context
                                  No context
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):65536
                                  Entropy (8bit):0.9802862985333479
                                  Encrypted:false
                                  SSDEEP:192:/9b1ieot80BU/gjkZrCpvOzuiFKZ24IO8WY:/h10t3BU/gjWzuiFKY4IO8Z
                                  MD5:F1543C3768BF5149197F8F48EF17027F
                                  SHA1:CD62DE6FE1724823FE1C1AF5B506677F23DCD30D
                                  SHA-256:165CF4D14A576CE68E002F20F7E5AD170E4C9540FAB6D03A70F74592E49A40BB
                                  SHA-512:5FFF19DB8C4A917E147776CCAA5D30E30C53EF65C0AB5B40DDB8FB38C7F6E857A39150AB121F662F0D7D8E7B82717B8E515756894AF539535D447B2884386C23
                                  Malicious:false
                                  Reputation:low
                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.6.6.4.9.4.5.7.1.3.8.9.6.2.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.6.6.4.9.4.5.8.3.2.6.4.6.6.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.1.b.1.f.0.1.b.-.0.7.8.6.-.4.5.8.1.-.9.8.8.e.-.a.9.9.f.9.1.3.7.d.d.b.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.9.4.9.3.2.9.c.-.9.f.d.e.-.4.d.e.1.-.a.b.c.3.-.2.2.c.b.0.e.9.3.6.9.9.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.e.m.c.o.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.i.w.O.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.0.0.-.0.0.0.1.-.0.0.1.4.-.c.a.5.9.-.4.f.d.5.e.a.3.b.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.d.9.b.e.c.1.c.3.6.6.2.d.a.b.3.5.6.4.2.1.d.4.0.1.5.7.b.1.4.f.b.0.0.0.0.0.0.0.0.!.0.0.0.0.4.b.5.f.7.b.0.d.d.2.3.0.3.c.8.1.4.2.7.f.9.a.b.4.7.f.f.9.0.4.6.c.4.3.7.1.8.5.5.2.!.r.e.
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:Mini DuMP crash report, 14 streams, Thu Nov 21 07:57:37 2024, 0x1205a4 type
                                  Category:dropped
                                  Size (bytes):158618
                                  Entropy (8bit):1.8368558638621741
                                  Encrypted:false
                                  SSDEEP:384:f6c9Tx76XWNSp+69wECX0NUB6X5pnrsXeVBs0qSo/X9Ofihd36bG:yIAXWZ69vCX0u6X5pnrsacroCJ
                                  MD5:E072466B9A64EA0428698F0F34CD9F5C
                                  SHA1:892FF14FFAAE6ED88CC9F7598373DA01789A6010
                                  SHA-256:72119BA79BCFA44A0972B990599DDC83830DC3643170B8659CCE222E49961634
                                  SHA-512:0D01B3926072E960C2ECE1CF8A7730951E77B95B1337ABFDE19741C9FDCCB7D4E2CC4B5E8BE4A7DE44DD109F6D3C9601AC43252A11C32B0F1B31331CC2BD385C
                                  Malicious:false
                                  Preview:MDMP..a..... .........>g............4...........8...<.......T....\..........T.......8...........T...........h>..2-..........t!..........`#..............................................................................eJ.......#......GenuineIntel............T.............>g............................. ..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):6300
                                  Entropy (8bit):3.722815250093733
                                  Encrypted:false
                                  SSDEEP:96:RSIU6o7wVetbbNPK6rZHY/zoQE/+mQW5aM4U0g89bjBsfrhm:R6l7wVeJRK6rZHYUnpr0g89bjBsfrhm
                                  MD5:2E53CAAB5B98D7D8007772E66F9E23E4
                                  SHA1:803E315F028BF66ECBCF7C128914FBD5F038D361
                                  SHA-256:526D882BEFCE31F46C2000365D3D08BC11A909DD4469019BB320CC6B088DA712
                                  SHA-512:6E321CE1E67F8513E05DE9C0941D13AB7B3F8B48918E384B2401E852BD19A185FD9EE42CEF894BF3A6B0C423FC999AE102E6F60E1191AB316AF2CE5656121FF8
                                  Malicious:false
                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.8.8.8.<./.P.i.
                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):4610
                                  Entropy (8bit):4.4334383526139725
                                  Encrypted:false
                                  SSDEEP:48:cvIwWl8zscJg77aI9iVWpW8VYmvYm8M4JFlFGS+q8KzoHU1YMEWd:uIjfaI7Uk7VVyJMSI01YMEWd
                                  MD5:95AEEDC09B68EE229A4DA6BAC9A8DA6C
                                  SHA1:B0641AB5F7E84617F319588D1D0F7A40D6CD499F
                                  SHA-256:3DE21EA6C4E6AB4559928BA0B6218302B4F0155A77083860DFA17F986B069E05
                                  SHA-512:3B49188CCD65AFAF087D3E3F02D8CC8218268ECB24EDCFF13E45408271186460F82E1B4A78412F620F89B5AE029DA99D49DBBE2AD2EEE48991629BD82DDC00A9
                                  Malicious:false
                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="597540" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                  Process:C:\ProgramData\Remcos\remcos.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):234
                                  Entropy (8bit):3.3409834308699367
                                  Encrypted:false
                                  SSDEEP:3:rhlKlfzHQlxMfWl5JWRal2Jl+7R0DAlBG4moojklovDl6ALilXIkqoojklovDl6v:6lfzwlh5YcIeeDAlS1gWAAe5q1gWAv
                                  MD5:1210BFA629226786A54065AC3FE640A7
                                  SHA1:271A32EB63810AE755C730BEDDF5D213A6101A79
                                  SHA-256:B79DD03479368CCA86D62C937B1E12886F08EEAB3E56F6997F0203BA6592BA50
                                  SHA-512:30E0F4E8C0CF2D75B6DD992F4C9901F7844F44D73A7066B63F390F2385E7253CC1AB89B657EADFE866867970FF353DEA59A71EE102EF9AFB362E2341E7CA29F5
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\Remcos\logs.dat, Author: Joe Security
                                  Preview:....[.2.0.2.4./.1.1./.2.1. .0.2.:.5.6.:.1.2. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                  Process:C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):1231368
                                  Entropy (8bit):7.642363207806358
                                  Encrypted:false
                                  SSDEEP:24576:IPMpzxWvSQVw/BSCDyBSvbSFMySqL1fjv4G4uKZ0PU:JWvxiSCWBSzsVL1fktec
                                  MD5:08B5FA6876E0DC8D5C226597D89E646B
                                  SHA1:4B5F7B0DD2303C81427F9AB47FF9046C43718552
                                  SHA-256:402DC87138121E2AC00C7BC65BBDD39A9AB0091C3A1B163066924887A20AB361
                                  SHA-512:4F20A03DBCB5E16C4E934E67455EB48BF7BD9681B5FDC731BF278409C78E698527EE125AC2ED0E3F09BC1551A2684E16BA3E34613DA9A1EB32BCA781B85EA48C
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 39%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....>g..............0.................. ........@.. ....................................@.................................B...O........................6..........`...T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................v.......H............G......?.......X............................................0............{.....+..*&...}....*...0............{.....+..*&...}....*...0............{.....+..*&...}....*...0............{.....+..*&...}....*...0............{.....+..*&...}....*...0............{.....+..*.0............{.....+..*&...}....*...0............{.....+..*&...}....*...0............{.....+..*&...}....*...0............{.....+..*&...}....*...0............{.....+..*&...}....*...0............{.....+..*
                                  Process:C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:modified
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:true
                                  Preview:[ZoneTransfer]....ZoneId=0
                                  Process:C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1216
                                  Entropy (8bit):5.34331486778365
                                  Encrypted:false
                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                  Malicious:true
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                  Process:C:\ProgramData\Remcos\remcos.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1216
                                  Entropy (8bit):5.34331486778365
                                  Encrypted:false
                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                  Malicious:false
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                  Process:C:\ProgramData\Remcos\remcos.exe
                                  File Type:JSON data
                                  Category:dropped
                                  Size (bytes):962
                                  Entropy (8bit):5.015105568788186
                                  Encrypted:false
                                  SSDEEP:12:tkluQ+nd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qluQydRNuKyGX85jvXhNlT3/7AcV9Wro
                                  MD5:8937B63DC0B37E949F38E7874886D999
                                  SHA1:62FD17BF5A029DDD3A5CFB4F5FC9FE83A346FFFC
                                  SHA-256:AB2F31E4512913B1E7F7ACAB4B72D6E741C960D0A482F09EA6F9D96FED842A66
                                  SHA-512:077176C51DC10F155EE08326270C1FE3E6CF36C7ABA75611BDB3CCDA2526D6F0360DBC2FBF4A9963051F0F01658017389FD898980ACF7BB3B29B287F188EE7B9
                                  Malicious:false
                                  Preview:{. "geoplugin_request":"8.46.123.75",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):2232
                                  Entropy (8bit):5.3797706053345555
                                  Encrypted:false
                                  SSDEEP:48:fWSU4xympgv4RIoUP7gZ9tK8NPZHUx7u1iMuge//ZeUyus:fLHxv2IfLZ2KRH6Ougos
                                  MD5:E9E20E56CBAAF6A1FC9150F86894A4AA
                                  SHA1:CE0760469A9232B8FD5D859FA3EBE82D6AAA36D8
                                  SHA-256:57E59B19710A70211053A922D02EE9171F2431D88F26E2E29BC0672AA9B3C09F
                                  SHA-512:43DED4609B46876204DA11072C6C420A7CCDA1ABF38F131452DD44E1381A9C3FA42730A001EC29427C7C90B40131E345B5BBF45C7D68FF3F3E8A9594C5B618F7
                                  Malicious:false
                                  Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):60
                                  Entropy (8bit):4.038920595031593
                                  Encrypted:false
                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                  Malicious:false
                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.642363207806358
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                  • Win32 Executable (generic) a (10002005/4) 49.96%
                                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:ORDER AND SPECIFICATIONS.scr.exe
                                  File size:1'231'368 bytes
                                  MD5:08b5fa6876e0dc8d5c226597d89e646b
                                  SHA1:4b5f7b0dd2303c81427f9ab47ff9046c43718552
                                  SHA256:402dc87138121e2ac00c7bc65bbdd39a9ab0091c3a1b163066924887a20ab361
                                  SHA512:4f20a03dbcb5e16c4e934e67455eb48bf7bd9681b5fdc731bf278409c78e698527ee125ac2ed0e3f09bc1551a2684e16ba3e34613da9a1eb32bca781b85ea48c
                                  SSDEEP:24576:IPMpzxWvSQVw/BSCDyBSvbSFMySqL1fjv4G4uKZ0PU:JWvxiSCWBSzsVL1fktec
                                  TLSH:1E45BD14B3341B90D4324FB6E814AD091F62BF1C6C7DE42DA9BDF585A27B78214A8DCB
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....>g..............0.................. ........@.. ....................................@................................
                                  Icon Hash:f0d0f8f4f4d8f070
                                  Entrypoint:0x4fc596
                                  Entrypoint Section:.text
                                  Digitally signed:true
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x673ED1B9 [Thu Nov 21 06:22:49 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Signature Valid:false
                                  Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                  Signature Validation Error:The digital signature of the object did not verify
                                  Error Number:-2146869232
                                  Not Before, Not After
                                  • 13/11/2018 00:00:00 08/11/2021 23:59:59
                                  Subject Chain
                                  • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                  Version:3
                                  Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                  Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                  Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                  Serial:7C1118CBBADC95DA3752C46E47A27438
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xfc5420x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xfe0000x2e918.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x1294000x3608
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x12e0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xfac600x54.text
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000xfa59c0xfa60096bdac2c75564226ae67c71b1a63bbd7False0.9177873814278582data7.896990214277132IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0xfe0000x2e9180x2ea006f26b7572fb77cc716019f823b5e3b7aFalse0.27600850368632707data4.920625560038579IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x12e0000xc0x200c6cd489c9b2813113fc80c41e09c84f0False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0xfe2b00x68d3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9975032606670393
                                  RT_ICON0x104b840x10828Device independent bitmap graphic, 128 x 256 x 32, image size 655360.10162072636933633
                                  RT_ICON0x1153ac0x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.14468152196762665
                                  RT_ICON0x11e8540x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.17573937153419594
                                  RT_ICON0x123cdc0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.17725555030703827
                                  RT_ICON0x127f040x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 92160.23091286307053943
                                  RT_ICON0x12a4ac0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.4146341463414634
                                  RT_ICON0x12b5540x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.41270491803278686
                                  RT_ICON0x12bedc0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10240.6524822695035462
                                  RT_GROUP_ICON0x12c3440x84data0.7045454545454546
                                  RT_VERSION0x12c3c80x364data0.4308755760368664
                                  RT_MANIFEST0x12c72c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-11-21T08:56:15.448674+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449732154.216.16.546092TCP
                                  2024-11-21T08:56:18.131083+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449734178.237.33.5080TCP
                                  2024-11-21T08:56:33.025323+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449740154.216.16.546092TCP
                                  2024-11-21T08:56:33.181553+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449741154.216.16.546092TCP
                                  2024-11-21T08:56:35.462838+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449742154.216.16.546092TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 21, 2024 08:56:13.910897017 CET497326092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:14.030535936 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:14.030636072 CET497326092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:14.038124084 CET497326092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:14.157728910 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:15.404716015 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:15.448673964 CET497326092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:15.648668051 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:15.654901028 CET497326092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:15.774677038 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:15.775300026 CET497326092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:15.894942045 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:16.243769884 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:16.245197058 CET497326092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:16.364710093 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:16.444802999 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:16.494036913 CET497326092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:16.769603014 CET4973480192.168.2.4178.237.33.50
                                  Nov 21, 2024 08:56:16.889235973 CET8049734178.237.33.50192.168.2.4
                                  Nov 21, 2024 08:56:16.889322042 CET4973480192.168.2.4178.237.33.50
                                  Nov 21, 2024 08:56:16.889683962 CET4973480192.168.2.4178.237.33.50
                                  Nov 21, 2024 08:56:17.009284973 CET8049734178.237.33.50192.168.2.4
                                  Nov 21, 2024 08:56:18.131014109 CET8049734178.237.33.50192.168.2.4
                                  Nov 21, 2024 08:56:18.131083012 CET4973480192.168.2.4178.237.33.50
                                  Nov 21, 2024 08:56:18.154361963 CET497326092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:18.273938894 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:19.130348921 CET8049734178.237.33.50192.168.2.4
                                  Nov 21, 2024 08:56:19.130429983 CET4973480192.168.2.4178.237.33.50
                                  Nov 21, 2024 08:56:28.111875057 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:28.113217115 CET497326092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:28.232804060 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:31.489141941 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:31.490386963 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:31.540908098 CET497326092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:31.611428976 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:31.611543894 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:31.614548922 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:31.690525055 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:31.692537069 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:31.734206915 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:31.736289978 CET497326092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:31.812186003 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:31.812331915 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:31.815515041 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:31.935664892 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:32.968535900 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.025322914 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:33.128737926 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.181552887 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:33.212469101 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.216497898 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:33.336042881 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.336168051 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:33.363147020 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.366667986 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:33.413690090 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:33.455861092 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.486148119 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.486243010 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:33.533339024 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.533390045 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.533432961 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:33.533473015 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.533480883 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.533516884 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:33.533549070 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:33.533554077 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.533564091 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.533596039 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.533616066 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:33.533638000 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:33.533663988 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:33.575356007 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.575391054 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.605777025 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.653007030 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.653038025 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.653105974 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.653115988 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.653146029 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.653248072 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.653352022 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.653398037 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.653516054 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.653573990 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.895746946 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:33.897525072 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:33.947206974 CET497326092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:34.017137051 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.017335892 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:34.020575047 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:34.140108109 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.229015112 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:34.348633051 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.651361942 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.697196007 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:34.716767073 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:34.718044996 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:34.836743116 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.836772919 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.836788893 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.836802006 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.836886883 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.836899996 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.836930990 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.836952925 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.836994886 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.956600904 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.956624031 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.956752062 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.956769943 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.956779003 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.956820011 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.956837893 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.956967115 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.957011938 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.957056046 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:34.957135916 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.244652987 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:35.364336014 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.416699886 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.462837934 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:35.667624950 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.669826984 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.675750971 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:35.723167896 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:35.726979017 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:35.729156971 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:35.795365095 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.796103954 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:35.846564054 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.846596956 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.846642971 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.846695900 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.846750021 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.846759081 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.846846104 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.846854925 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.846924067 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.846935987 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.869441986 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:35.914804935 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.914855003 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.914874077 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.966180086 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.966191053 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.966206074 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.966248989 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.966301918 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.966337919 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.966411114 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.966444969 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.966500998 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.966526985 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.966589928 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.966711998 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.989125013 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.989140034 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.989203930 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.989212036 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.989252090 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:35.989285946 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.989294052 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.989309072 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.989347935 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:35.989372015 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.989381075 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:35.989447117 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.034476042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.034593105 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.109020948 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.109040976 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.109081984 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.109097958 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.109133005 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.109138012 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.109201908 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.109245062 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.109270096 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.109318018 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.109354019 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.109383106 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.109448910 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.109461069 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.109500885 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.109530926 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.109568119 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.109570980 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.109603882 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.109654903 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.154155970 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.228909969 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229058981 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229085922 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229146004 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229202032 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229255915 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229315042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229402065 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229437113 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229521036 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229576111 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229633093 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229641914 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229749918 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229758978 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229767084 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229839087 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229846954 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229856014 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.229866028 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.259927988 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.379440069 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.693320990 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.731616020 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.733156919 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.803554058 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.851294041 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.851332903 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.851422071 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.851457119 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.851562977 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.851577997 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.851675034 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.851696014 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.851758957 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.851777077 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.851865053 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.851874113 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.851957083 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.851975918 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.852664948 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.852724075 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.852809906 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.852826118 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.852896929 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.852943897 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.853013039 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.853033066 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.853111029 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.853147984 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:36.853462934 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.934475899 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.936239958 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.937954903 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.939707041 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:36.940866947 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:37.054181099 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.054208994 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.054266930 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.054296017 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.054459095 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.054470062 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.054526091 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.054569006 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.054641962 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.054650068 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.054692030 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.054699898 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.054809093 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.054816961 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.055880070 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.055896044 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.055973053 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.056016922 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.056055069 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.056869030 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.056936026 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.057004929 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.057045937 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.057137966 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.057147980 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.057264090 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.057271957 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.057280064 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.057578087 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.057616949 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.057739973 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.057748079 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.057851076 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.057867050 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.057967901 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.057982922 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.058039904 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.058048964 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.058083057 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.058171988 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.058180094 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.058187962 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.059257984 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.059355021 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.059370995 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.059462070 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.059470892 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.059499025 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.059520960 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.138778925 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.138803005 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.173676014 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.173711061 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.173732996 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.173743010 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.173752069 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.173846006 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.173856020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.173887968 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.173897028 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.173954010 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.173990011 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.174031973 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.174088955 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.174098015 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.275652885 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:37.395286083 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.520406008 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.572499037 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:37.663074017 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:37.665885925 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:37.668708086 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:37.671634912 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:37.673568010 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:37.709589958 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.759706974 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:37.760390997 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:37.762564898 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:37.782892942 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.782948971 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.782993078 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.783013105 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.783078909 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.783163071 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.783180952 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.783353090 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.783380985 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.783400059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.783560991 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.783655882 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.783689022 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.783708096 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.785717964 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.785801888 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.785897017 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.785906076 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.785995960 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.786005974 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.786103010 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.786119938 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.786226988 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.786236048 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.786323071 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.786339045 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.786447048 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.786464930 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.788331032 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.788414001 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.788553953 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.788563967 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.788686991 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.788696051 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.788778067 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.788875103 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.788883924 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.788892031 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.789002895 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.789014101 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.789119959 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.789129019 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.791356087 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.791368008 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.791454077 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.791461945 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.791588068 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.791604042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.791732073 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.791740894 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.791825056 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.791873932 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.791882992 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.811889887 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.811914921 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.902350903 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.902362108 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.902410984 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.902426958 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.902503967 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.902539968 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.902596951 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.902662039 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.902736902 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.902745962 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.902856112 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.902873993 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.902885914 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.902959108 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.905061007 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.905076981 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.905162096 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.905265093 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.905355930 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.905364990 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.905407906 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.905467033 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.905551910 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.905570030 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.905615091 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.905673981 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.905695915 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.905711889 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.905720949 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.905746937 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.907813072 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.907824039 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.907944918 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:37.907953978 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.239654064 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.290963888 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:38.291198969 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:38.348208904 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:38.350287914 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:38.352386951 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:38.354232073 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:38.355492115 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:38.410662889 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.468008995 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.468022108 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.468100071 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.468110085 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.468184948 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.468194962 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.468346119 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.468354940 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.468377113 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.468384981 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.468488932 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.468497992 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.468508005 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.468549013 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.469935894 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.469960928 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.470051050 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.470058918 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.470108986 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.470118046 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.470222950 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.470232964 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.470324993 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.470334053 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.470387936 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.470396996 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.470431089 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.530199051 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.530301094 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.530309916 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.530324936 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.530363083 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.587552071 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.587570906 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.587651014 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.587661028 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.587748051 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.587762117 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.587800026 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.587857008 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.587950945 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.587960005 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.587995052 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588047028 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588057041 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588154078 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588162899 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588224888 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588233948 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588306904 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588325024 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588372946 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588382006 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588480949 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588490009 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588494062 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588584900 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588593960 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588603020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588610888 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588669062 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.588677883 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.589474916 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.589498043 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.589514971 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.716419935 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.759726048 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:38.775738955 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:38.777761936 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:38.895442963 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.895457029 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.895474911 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.895566940 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.895581961 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.895591974 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.895699024 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.895709038 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.895725012 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.895734072 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.895836115 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.895844936 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.895884037 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.895891905 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.897326946 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.897336006 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.897460938 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.897469997 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.897587061 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.897595882 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.897655964 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.897695065 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.897747040 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.897756100 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:38.977456093 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.025429964 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:39.102121115 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:39.104300022 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:39.106307030 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:39.108267069 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:39.109797955 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:39.221852064 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.221869946 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.221939087 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.222004890 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.222064018 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.222126007 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.222161055 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.222207069 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.222273111 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.222347021 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.222393036 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.222413063 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.222472906 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.222511053 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.223862886 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.223916054 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.223937988 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.224064112 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.224093914 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.224153996 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.224196911 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.224318981 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.224329948 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.224410057 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.224419117 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.224519014 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.224526882 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.224591970 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.225975990 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.226012945 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.226120949 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.226131916 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.226207018 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.226216078 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.226280928 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.226296902 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.226346016 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.226422071 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.226429939 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.226471901 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.226509094 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.226618052 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.227794886 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.227822065 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.227906942 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.227916002 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.227966070 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.228063107 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.228071928 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.228142023 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.228158951 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.228207111 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.228267908 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.228322983 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.228369951 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.228379011 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.229418039 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.229453087 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.229501963 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.306715965 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.306814909 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:39.341182947 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.341273069 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.341310978 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.341320992 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.341365099 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.426414013 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.669554949 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.712939978 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:39.739383936 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.770899057 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:39.772341967 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:39.802232981 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:39.804219007 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:39.806531906 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:39.808762074 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:39.810112000 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:39.890659094 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.890676022 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.890768051 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.890779972 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.890891075 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.890901089 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.890944958 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.890974998 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.891069889 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.891078949 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.891150951 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.891170025 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.891243935 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.891294956 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.892024994 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.892041922 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.892163992 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.892368078 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.892445087 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.892463923 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.892590046 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.892599106 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.892678976 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.892688036 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.922065973 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.922152996 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.922250986 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.922260046 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.922355890 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.922418118 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.922528982 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.922538996 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.922610044 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.922619104 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.922662020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.922679901 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.922786951 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.922840118 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.923743010 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.923861980 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.923871994 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.924000025 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.924103022 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.924165964 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.924217939 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.924279928 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.924288988 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.924324989 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.924335003 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.924400091 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.924453020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.924484968 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.926167011 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.926177979 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.926307917 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.926357031 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.926449060 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.926481962 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.926573992 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.926583052 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.926630020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.926676035 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.926723957 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.926772118 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.926820040 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.926870108 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:39.951867104 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.010087967 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.010130882 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.010185957 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.010202885 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.010401011 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.010417938 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.010525942 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.010543108 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.010638952 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.010654926 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.010715961 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.010776997 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.010786057 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.010848999 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.010886908 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.010951996 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.011033058 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.011042118 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.011301994 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.011358976 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.011406898 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.011455059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.322438955 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:40.379776001 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.431557894 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:40.442025900 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.507481098 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:40.509480000 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:40.511900902 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:40.514054060 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:40.515393972 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:40.627367020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.627382040 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.627485037 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.627521038 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.627625942 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.627635956 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.627703905 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.627763987 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.627876043 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.627911091 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.627954960 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.628000975 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.628051996 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.628061056 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.628947973 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.629038095 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.629048109 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.629127979 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.629139900 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.629215956 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.629369020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.629379034 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.629385948 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.629415035 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.629430056 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.629508018 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.629530907 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.629576921 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.631397963 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.631453991 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.631463051 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.631505966 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.631572008 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.631671906 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.631681919 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.631707907 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.631716967 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.633557081 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.710886002 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.710899115 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.710906982 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.745006084 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.746717930 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.746727943 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.746750116 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747021914 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747031927 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747040033 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747148991 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747158051 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747165918 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747174978 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747298002 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747308016 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747473955 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747483015 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747625113 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747634888 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747643948 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747786045 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747801065 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747931957 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747941971 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747955084 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.747963905 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.748101950 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.791461945 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:40.807815075 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:40.809201956 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:40.927412987 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.927440882 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.927484035 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.927493095 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.927550077 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.927591085 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.927637100 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.927684069 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.927721977 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.927772999 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.927787066 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.927902937 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.927912951 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.927921057 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.928760052 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.928770065 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.928827047 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.928879023 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.928919077 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.928960085 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.929033041 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.929043055 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.929132938 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:40.929142952 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.108280897 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.150450945 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:41.226911068 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:41.228938103 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:41.230994940 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:41.233062029 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:41.234483004 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:41.338229895 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:41.346817017 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.346838951 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.346851110 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.346858978 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.346889019 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.346900940 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.347028017 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.347044945 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.347147942 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.347192049 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.347245932 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.347254992 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.347327948 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.347357988 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.348534107 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.348582983 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.348642111 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.348651886 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.348890066 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.348956108 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.349054098 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.349064112 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.349150896 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.349160910 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.349212885 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.349221945 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.349260092 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.349292994 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.350492954 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.350534916 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.350675106 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.350692034 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.350790977 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.350800037 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.350864887 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.350874901 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.350931883 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.350940943 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.350980997 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.430752039 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.430785894 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.430871964 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466293097 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466315031 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466362000 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466371059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466502905 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466512918 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466588020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466597080 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466682911 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466691971 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466743946 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466753960 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466823101 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466831923 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466846943 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466958046 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466967106 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466983080 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.466990948 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.467128992 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.467138052 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.467145920 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.467161894 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.467173100 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.769803047 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.809740067 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:41.810995102 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:41.833302975 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.884800911 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:41.929636002 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.929682970 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.929697037 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.929723978 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.929738045 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.929749012 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.929821014 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.929833889 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.929897070 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.929909945 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.929971933 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.929984093 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.930016994 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.930056095 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.930586100 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.930610895 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.930633068 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.930658102 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.930810928 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.930833101 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.930891037 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.930936098 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.930959940 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.930983067 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:41.990775108 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:41.992511034 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:41.994257927 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:41.995995998 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:41.997136116 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:42.110869884 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.110888958 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.110894918 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.110913992 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.110928059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.110941887 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.110956907 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.110970020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.110981941 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.110996008 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.111165047 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.111179113 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.111191034 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.111202955 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.112026930 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.112050056 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.112092018 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.112343073 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.112467051 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.112586021 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.112600088 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.112708092 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.113864899 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.113976955 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.113992929 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.114108086 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.114245892 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.114259005 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.114270926 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.115570068 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.115614891 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.115797043 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.159279108 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.166686058 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.223247051 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.230422974 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.230464935 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.230586052 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.230633974 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.353790998 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:42.473419905 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.573802948 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.619076967 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:42.747733116 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:42.749861956 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:42.751975060 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:42.754081011 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:42.755250931 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:42.776082993 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.820334911 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:42.821734905 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:42.867758036 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.867786884 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.867822886 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.868021011 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.868033886 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.868045092 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.868057966 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.868069887 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.868082047 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.868093967 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.868135929 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.868149042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.868161917 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.868174076 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.869452953 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.869466066 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.869627953 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.869641066 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.869697094 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.869750977 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.869848967 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.869860888 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.871627092 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.871649027 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.871767998 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.871848106 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.872030020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.872107029 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.875530958 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.940083027 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.940155983 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.940179110 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.940191031 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.940227032 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.940327883 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.940340996 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.940363884 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.940377951 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.940382957 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.940387964 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.940419912 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.940432072 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.940443993 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.941271067 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.941323042 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.941335917 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.941417933 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.941438913 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.941559076 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.941571951 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.941592932 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.941613913 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:42.941636086 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.298942089 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.353439093 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:43.369729042 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:43.418224096 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:43.420279980 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:43.422328949 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:43.424334049 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:43.425733089 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:43.489329100 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.537897110 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.537910938 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.538008928 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.538021088 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.538145065 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.538157940 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.538244963 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.538280964 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.538355112 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.538367987 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.538460016 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.538471937 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.538516998 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.538530111 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.539869070 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.539880991 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.539973974 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.540031910 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.540138006 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.540205002 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.540329933 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.540342093 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.541950941 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.542037964 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.542084932 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.542208910 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.542293072 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.542387962 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.542475939 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.543898106 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.543951988 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.544092894 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.544194937 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.544271946 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.544357061 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.544378042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.591262102 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.608998060 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.609122038 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.657526970 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.657707930 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.798870087 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.833612919 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:43.834862947 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:43.953393936 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.953408003 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.953486919 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.953500986 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.953605890 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.953655958 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.953704119 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.953742027 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.953841925 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.953865051 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.953917027 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.953928947 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.954031944 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.954044104 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.954413891 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.954437017 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.954576969 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.954619884 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.954729080 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.954751015 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.954823971 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.954835892 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.954875946 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.954922915 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:43.986223936 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.040930986 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:44.104737997 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:44.106833935 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:44.108885050 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:44.110888958 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:44.112236977 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:44.224507093 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.224524975 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.224539042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.224550962 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.224644899 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.224658966 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.224765062 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.224787951 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.224891901 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.224905014 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.225023031 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.225073099 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.225184917 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.225229979 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.226417065 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.226475954 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.226592064 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.226707935 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.226783037 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.226861954 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.226957083 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.226989031 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.228461981 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.228578091 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.228662014 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.228774071 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.228823900 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.228913069 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.229029894 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.230675936 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.230806112 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.230829000 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.230990887 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.231121063 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.231199980 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.231920958 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.232019901 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.232115984 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.233031988 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.233047009 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.384969950 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:44.504647017 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.655652046 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.697211981 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:44.807925940 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.810415030 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:44.812400103 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:44.814405918 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:44.816359043 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:44.817660093 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:44.853502989 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:44.864185095 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:44.865686893 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:44.930126905 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.930143118 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.930157900 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.930197954 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.930243969 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.930315018 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.930438042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.930463076 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.930511951 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.930552006 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.930599928 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.930643082 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.930686951 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.930711031 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.932007074 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.932089090 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.932173967 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.932302952 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.932391882 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.932506084 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.934087992 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.934263945 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.934361935 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.934500933 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.934611082 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.934761047 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.934789896 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.936110020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.936201096 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.936340094 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.936443090 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.936552048 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.936659098 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.936769962 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.937365055 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.937468052 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.937517881 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.937704086 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.937753916 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.983884096 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.983899117 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.984013081 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.984036922 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.984097004 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.984148979 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.984236002 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.984249115 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.984324932 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.984338045 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.984435081 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.984467983 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.984591007 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.984603882 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.985217094 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.985292912 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.985383987 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.985405922 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.985495090 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.985517979 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:44.985575914 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.049643993 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.049669027 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.049772024 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.357589006 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.400490999 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:45.400803089 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:45.474864006 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:45.476814985 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:45.478858948 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:45.480902910 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:45.482220888 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:45.520287991 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.594702959 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.594717979 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.594731092 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.594736099 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.594865084 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.594877958 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.594957113 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.594980001 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.595038891 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.595096111 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.595211983 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.595225096 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.595320940 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.595345020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.596369028 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.596436024 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.596524000 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.596663952 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.596730947 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.596796036 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.596900940 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.596939087 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.598690987 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.598778963 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.598792076 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.599020004 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.599033117 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.600593090 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.600647926 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.600733995 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.600836992 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.600915909 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.601006985 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.601030111 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.601769924 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.601824999 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.601953983 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.639832973 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.639851093 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.829694986 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.867945910 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:45.869465113 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:45.869504929 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:45.987746000 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.987766981 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.987889051 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.987899065 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.988004923 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.988020897 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.988116026 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.988125086 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.988203049 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.988236904 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.988322020 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.988332033 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.988415956 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.988425970 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.989016056 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.989032030 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.989160061 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.989170074 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.989259958 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.989276886 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.989377975 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.989393950 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.989432096 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:45.989505053 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.023185015 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.072221041 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:46.180190086 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:46.182226896 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:46.184218884 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:46.186297894 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:46.187683105 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:46.299905062 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.299978971 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.299983978 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.300024033 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.300031900 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.300159931 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.300168991 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.300179005 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.300213099 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.300251007 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.300340891 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.300357103 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.300375938 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.300405025 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.301865101 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.301904917 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.302018881 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.302067041 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.302124023 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.302210093 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.302320004 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.302329063 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.303822994 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.303917885 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.303985119 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.304071903 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.304112911 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.304250956 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.304289103 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.306032896 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.306138039 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.306186914 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.306247950 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.306389093 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.307229042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.351270914 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.354652882 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.357954025 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.358061075 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.358165026 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.416194916 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:46.419646978 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.419836998 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.535856962 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.746691942 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.794421911 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:46.838471889 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.880172014 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:46.880752087 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:46.881583929 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:46.882787943 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:46.884769917 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:46.886817932 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:46.888170004 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:46.999929905 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:46.999943018 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000030994 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000041962 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000144005 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000200033 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000349998 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000359058 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000526905 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000627995 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000637054 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000644922 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000655890 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000705957 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000756025 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000765085 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000853062 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000861883 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000869989 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000966072 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000974894 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000982046 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.000989914 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.001095057 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.001107931 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.001116991 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.001127958 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.001293898 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.001353979 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.001363039 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.001452923 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.001467943 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.001599073 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.001678944 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.001689911 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.001785040 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.001795053 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.001854897 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.002376080 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.002506971 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.002636909 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.002779007 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.002875090 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.002993107 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.003093004 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.003179073 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.033663034 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.083272934 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.119611025 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.119698048 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.119719028 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.119805098 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.119935036 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.119945049 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.120066881 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.120115042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.120223045 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.120269060 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.120408058 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.120502949 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.120712042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.120745897 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.120923996 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.121083021 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.121262074 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.121272087 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.431935072 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:47.519695044 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.551528931 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.572204113 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:47.655225992 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:47.657078981 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:47.659035921 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:47.661027908 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:47.662338018 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:47.775072098 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.775137901 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.775237083 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.775276899 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.775333881 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.775342941 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.775449038 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.775458097 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.775485039 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.775559902 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.775676966 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.775691986 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.775783062 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.775808096 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.776973963 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.776982069 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.777074099 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.777152061 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.777240038 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.777301073 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.777384043 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.777400017 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.778808117 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.778825998 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.778971910 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.778985977 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.779084921 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.779099941 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.780632973 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.780740023 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.780747890 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.780827999 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.780952930 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.781039000 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.781053066 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.790812969 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.811232090 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.846573114 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.846662045 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.846713066 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.864423990 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:47.901207924 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:47.902601957 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:48.021117926 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.021147013 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.021151066 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.021155119 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.021193027 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.021202087 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.021281958 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.021292925 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.021342993 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.021358967 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.021447897 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.021465063 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.021549940 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.021646023 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.022144079 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.022152901 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.022247076 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.022264957 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.022356033 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.022387981 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.022458076 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.022517920 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.022562027 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.022608995 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.208863020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.259717941 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:48.314843893 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:48.316807985 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:48.318717003 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:48.320466042 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:48.321605921 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:48.434762955 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.434794903 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.434995890 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.435045958 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.435213089 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.435229063 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.435343027 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.435383081 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.435512066 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.435564995 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.435668945 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.435708046 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.435861111 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.435870886 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.436527014 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.436537027 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.436779976 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.436945915 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.437078953 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.437256098 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.437452078 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.437469006 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.438534021 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.438541889 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.438671112 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.438824892 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.438878059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.438970089 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.438980103 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.440073013 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.440212011 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.440336943 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.440429926 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.440543890 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.440561056 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.440608978 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.441188097 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.441309929 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.441334963 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.441431999 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.441442013 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.447407961 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:48.567056894 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.862215042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.869997025 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:48.916028023 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:48.916039944 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:48.936016083 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:48.938224077 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:48.983489037 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:48.986464977 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:48.989480019 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:48.991503000 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:48.992647886 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:49.055740118 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.055761099 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.055834055 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.055850983 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.055882931 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.055944920 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.055995941 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.056018114 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.056135893 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.056150913 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.056200981 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.056248903 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.056314945 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.056361914 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.057858944 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.057924032 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.057976007 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.057988882 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.058096886 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.058109045 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.058155060 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.058166981 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.058191061 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.058232069 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.103436947 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.103451014 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.103466034 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.103477001 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.103553057 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.103565931 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.103665113 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.103682995 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.103722095 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.103734016 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.103818893 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.103831053 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.103923082 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.103971004 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.106093884 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.106106997 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.106179953 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.106353045 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.106395960 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.106462002 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.106517076 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.106587887 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.109153032 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.155267954 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.155344963 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.175529003 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.175755978 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.176049948 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.176105976 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.176201105 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.176317930 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.176372051 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.176426888 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.176572084 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.176629066 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.176650047 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.176672935 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.176764011 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.176814079 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.176871061 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.176883936 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.463032961 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:49.544009924 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.582750082 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.587852001 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:49.678822994 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:49.681840897 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:49.684813976 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:49.687763929 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:49.689750910 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:49.798711061 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.798767090 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.798846006 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.798855066 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.798943996 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.798952103 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.799069881 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.799117088 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.799210072 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.799251080 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.799357891 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.799365997 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.799455881 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.799470901 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.801676989 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.801709890 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.801888943 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.801949978 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.802067041 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.802128077 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.802247047 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.802256107 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.805507898 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.805558920 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.805645943 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.805716991 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.805763960 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.805860996 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.805871010 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.807310104 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.807398081 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.807560921 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.807696104 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.807806969 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.807815075 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.807838917 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.809400082 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.809494972 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.826836109 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.867223024 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.885468960 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.918251991 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:49.931564093 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:49.932322025 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:49.934053898 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:50.052051067 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.052146912 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.052215099 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.052273035 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.052356958 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.052392006 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.052566051 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.052603960 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.052665949 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.052700996 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.052763939 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.052800894 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.052864075 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.052900076 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.053688049 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.053755045 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.053817034 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.053853035 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.053983927 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.054019928 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.054081917 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.054119110 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.054163933 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.054224968 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.242702961 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.291002989 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:50.377799988 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:50.380805969 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:50.383763075 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:50.386738062 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:50.388704062 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:50.481868029 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:50.497643948 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.497790098 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.497802973 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.497823000 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.497883081 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.497900009 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.498047113 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.498075962 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.498166084 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.498193026 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.498284101 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.498323917 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.498450041 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.498492002 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.500375986 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.500442982 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.500583887 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.500775099 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.500933886 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.501040936 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.501233101 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.501249075 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.503467083 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.503571987 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.503678083 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.503726006 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.503791094 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.503849983 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.503928900 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.506505966 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.506757975 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.506771088 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.506947994 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.507113934 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.507386923 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.507668972 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.570785046 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.617053986 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.617124081 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.617147923 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.920237064 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.956051111 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:50.962938070 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:50.988137007 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:50.989288092 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:51.009824038 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:51.091393948 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:51.093040943 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:51.094875097 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:51.096679926 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:51.097981930 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:51.107825994 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.107888937 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.107917070 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.107964039 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.107990026 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.108021975 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.108068943 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.108166933 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.108192921 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.108266115 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.108295918 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.108344078 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.108390093 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.108421087 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.108879089 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.108968973 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.108994961 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.109110117 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.109136105 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.109168053 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.109215975 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.109298944 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.109325886 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.109358072 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.211116076 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.211241961 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.211291075 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.211456060 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.211503983 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.211704969 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.211752892 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.211926937 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.212063074 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.212090015 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.212160110 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.212187052 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.212214947 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.212260962 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.212852001 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.212922096 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.212970018 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.213079929 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.213125944 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.213318110 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.213382959 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.213449001 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.214567900 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.214596033 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.214724064 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.214879036 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.214926004 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.215049982 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.215076923 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.216300011 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.216346979 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.216542006 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.216597080 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.216810942 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.216962099 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.217010021 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.217638969 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.217665911 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.217827082 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.217874050 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.494412899 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:51.614002943 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.637293100 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.681637049 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:51.783494949 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:51.786676884 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:51.789877892 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:51.792860985 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:51.794811964 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:51.904066086 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.904156923 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.904186964 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.904238939 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.904266119 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.904294968 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.904321909 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.904370070 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.904396057 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.904445887 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.904474020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.904527903 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.904555082 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.904586077 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.906558037 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.906585932 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.906641960 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.906752110 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.906848907 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.907566071 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.907598972 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.907699108 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.910764933 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.910873890 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.911442995 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.911494970 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.912492990 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.912611961 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.912640095 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.913839102 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.914472103 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.915041924 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.915209055 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.915640116 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.916316986 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.921186924 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.921215057 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:51.959503889 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:51.960656881 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:51.963210106 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.024442911 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.024518967 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.025160074 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.025211096 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.079191923 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.079245090 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.079392910 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.079447985 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.079576969 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.079592943 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.079751968 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.079802990 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.079945087 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.079972029 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.080019951 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.080046892 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.080096006 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.080154896 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.080317974 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.080364943 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.080478907 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.080526114 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.080585957 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.080657005 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.080760956 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.080806971 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.080854893 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.080867052 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.361640930 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.415973902 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:52.498436928 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:52.501450062 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:52.504026890 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:52.505779982 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:52.506917953 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:52.509856939 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:52.618765116 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.618808985 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.618838072 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.618865967 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.618894100 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.618953943 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.618982077 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.619010925 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.619038105 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.619090080 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.619117022 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.619146109 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.619194984 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.619221926 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.621148109 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.621196985 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.621246099 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.621376991 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.621452093 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.621619940 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.621648073 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.621675968 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.623719931 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.623842955 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.623871088 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.623922110 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.624057055 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.624105930 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.624171972 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.625437975 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.625488997 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.625679970 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.625786066 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.625946999 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.625974894 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.626002073 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.626601934 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.629553080 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.702934980 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.737991095 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.738033056 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:52.738060951 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.040900946 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.066564083 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.086395979 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:53.087625980 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:53.119082928 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:53.187187910 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:53.188908100 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:53.190610886 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:53.192464113 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:53.193752050 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:53.207298040 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.207323074 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.207588911 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.207598925 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.207607031 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.207616091 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.207751989 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.207762003 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.207770109 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.207911968 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.207920074 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.207927942 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.207937002 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.207946062 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.208384991 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.208539963 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.208549023 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.208556890 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.208564997 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.208692074 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.208700895 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.208709002 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.208832979 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.208842993 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.308079004 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.308094025 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.308101892 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.308109999 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.308119059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.308128119 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.308136940 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.308140993 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.308149099 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.308294058 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.308303118 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.308310986 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.308320045 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.308329105 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.308804035 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.308814049 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.309367895 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.309376001 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.309381962 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.309390068 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.309397936 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.309406042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.310364962 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.312633038 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.327928066 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.327956915 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.328923941 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.328947067 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.330018044 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.330130100 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.330152988 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.331202984 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.331245899 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.331279993 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.331392050 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.331693888 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.331722021 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.331772089 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.331799030 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.331892967 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.331919909 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.525696039 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:53.648773909 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.733917952 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.775444984 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:53.864871025 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:53.867860079 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:53.870138884 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:53.871907949 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:53.873075008 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:53.949219942 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.984700918 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.984759092 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.984787941 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.984832048 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.984883070 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.984911919 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.984987974 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.985035896 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.985064030 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.985111952 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.985160112 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.985187054 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.985234976 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.985263109 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.987637997 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.987687111 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.987759113 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.987993956 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.988096952 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.988281965 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.988380909 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.988409042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.990257978 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.990308046 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.990741014 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.990791082 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.990895033 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.990922928 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.990969896 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.991487980 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.991616011 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.991710901 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.991841078 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.991945982 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.992047071 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.992074013 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.992795944 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.992902994 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.992949963 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.993083954 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.993261099 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:53.994097948 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:54.003549099 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:54.004844904 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:54.123198032 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.123225927 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.123275995 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.123341084 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.123399019 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.123426914 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.123467922 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.123518944 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.123549938 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.123650074 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.123677969 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.123708010 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.123756886 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.123907089 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.124433994 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.124481916 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.124510050 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.124583006 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.124609947 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.124679089 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.124728918 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.124840021 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.124867916 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.124896049 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.409801960 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.462930918 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:54.541470051 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:54.546797991 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:54.549056053 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:54.551156998 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:54.553142071 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:54.554296017 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:54.661133051 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.666368961 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.666424036 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.666456938 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.666583061 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.666613102 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.666641951 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.666654110 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.666688919 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.666752100 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.666762114 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.666841030 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.666855097 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.666914940 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.666930914 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.668628931 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.668694019 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.668751955 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.668828011 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.668935061 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.668999910 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.669118881 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.670744896 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.670861006 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.670948029 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.671130896 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.671237946 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.671365023 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.671394110 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.672749996 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.672801018 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.672974110 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.673079967 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.673279047 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.673388958 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.673420906 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.673873901 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.715187073 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.742825985 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.780585051 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.786060095 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:54.963762999 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.012254953 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:55.046583891 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:55.048755884 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:55.110517025 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.165987968 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:55.166300058 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.166343927 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.166379929 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.166408062 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.166457891 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.166486979 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.166520119 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.166568041 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.166680098 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.166708946 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.166759014 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.166785955 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.166835070 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.166862965 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.168275118 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.168395996 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.168423891 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.168457031 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.168528080 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.168651104 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.168678999 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.168709993 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.168756962 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.233452082 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:55.235421896 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:55.237473011 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:55.239512920 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:55.240845919 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:55.353219032 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.353235960 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.353247881 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.353351116 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.353360891 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.353451967 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.353471041 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.353578091 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.353605986 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.353694916 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.353703976 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.353771925 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.353790045 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.353835106 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.354994059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.355058908 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.355189085 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.355365038 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.355515003 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.355555058 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.355640888 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.355649948 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.357158899 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.357184887 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.357372999 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.357506037 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.357609034 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.357629061 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.357637882 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.359154940 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.359261036 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.359361887 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.359437943 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.359533072 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.359596968 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.359608889 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.360486031 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.360611916 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.360673904 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.360790968 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.360800028 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.557827950 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:55.677329063 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.788105011 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:55.837867022 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:55.927697897 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:55.929630041 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:55.931668997 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:55.933676958 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:55.935013056 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:55.979705095 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.025376081 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:56.040805101 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:56.043807030 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:56.047386885 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.047408104 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.047504902 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.047523022 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.047616005 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.047652006 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.047712088 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.047760010 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.047871113 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.047880888 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.047986031 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.048001051 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.048094988 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.048105001 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.051945925 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.051974058 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.052005053 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.052102089 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.052128077 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.052151918 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.052176952 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.052201986 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.052227020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.052285910 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.052311897 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.052401066 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.052426100 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.052450895 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.052475929 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.053673983 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.053962946 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.054142952 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.054302931 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.054311991 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.054464102 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.054475069 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.055140018 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.055294991 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.055304050 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.055444956 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.055454016 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.161958933 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.162004948 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.162075043 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.162103891 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.162154913 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.162182093 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.162338018 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.162365913 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.162421942 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.162448883 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.162594080 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.162621975 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.162651062 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.162677050 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.164726019 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.164755106 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.164838076 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.164865017 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.165079117 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.165252924 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.474113941 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.525396109 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:56.576114893 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:56.651482105 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:56.654500008 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:56.657455921 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:56.660397053 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:56.662368059 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:56.695683002 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.771234035 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.771358967 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.771414995 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.771471977 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.771501064 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.771547079 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.771600962 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.771630049 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.771678925 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.771707058 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.771759033 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.771785975 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.771843910 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.771893024 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.774051905 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.774133921 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.774185896 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.774312019 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.774418116 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.774523973 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.774661064 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.774688005 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.776973009 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.777100086 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.777165890 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.777240038 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.777321100 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.777399063 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.777466059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.779939890 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.780019999 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.780241013 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.780385971 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.780404091 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.780585051 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.780616999 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.815200090 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.890647888 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.890764952 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.890816927 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.890928984 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:56.998886108 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.047991037 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:57.222639084 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.238322973 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:57.242628098 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:57.275365114 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:57.357992887 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.358006954 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.358104944 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.358114958 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.358156919 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.358201027 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.358289957 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.358308077 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.358376980 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.358392954 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.358467102 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.358498096 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.358611107 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.358622074 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.362219095 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.362266064 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.362410069 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.362467051 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.362591028 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.362668991 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.430675983 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:57.433989048 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:57.436666965 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:57.446491957 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:57.448071957 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:57.550288916 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.550318003 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.550434113 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.550508022 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.550599098 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.550640106 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.550733089 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.550776958 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.550909996 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.551001072 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.551050901 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.551070929 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.551244020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.551254034 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.553554058 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.553570032 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.553750992 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.553946018 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.553997993 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.554084063 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.554217100 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.554333925 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.556696892 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.556833982 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.556907892 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.557169914 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.557307959 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.557353020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.566113949 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.566282988 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.566734076 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.567667961 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.567722082 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.567800999 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.567847013 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.567894936 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.588114023 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:57.707608938 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:57.984189034 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.010487080 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.025403976 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:58.053306103 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:58.054733992 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:58.119848013 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:58.121618032 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.121939898 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:58.124058962 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:58.126168966 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:58.127505064 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:58.129131079 CET497326092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:58.172993898 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.173051119 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.173104048 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.173134089 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.173197031 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.173224926 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.173258066 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.173346043 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.173373938 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.173408031 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.173435926 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.173470020 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.173544884 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.173572063 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.174411058 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.174438953 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.174504042 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.174566984 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.174609900 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.174659967 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.239556074 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.239567995 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.239594936 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.239651918 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.239738941 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.239782095 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.239897013 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.240032911 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.240044117 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.240052938 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.240170002 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.240221024 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.240305901 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.240315914 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.241533041 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.241549969 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.241660118 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.241775990 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.241853952 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.242006063 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.242093086 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.242111921 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.243769884 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.243849993 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.243881941 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.244007111 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.244050980 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.244173050 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.244184017 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.245743036 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.245879889 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.245966911 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.246056080 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.246203899 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.246370077 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.246479988 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.247349024 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.247359037 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.247446060 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.247582912 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.247615099 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.248630047 CET609249732154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.603773117 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:58.674215078 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.723429918 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.728508949 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:58.776717901 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:58.778755903 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:58.780709028 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:58.782681942 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:58.783968925 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:58.896646023 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.896682024 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.896749973 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.896776915 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.896872044 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.896922112 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.897034883 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.897085905 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.897234917 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.897309065 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.897416115 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.897473097 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.897561073 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.897610903 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.898313999 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.898511887 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.898627043 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.898761034 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.898905039 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.899013042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.899183989 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.899331093 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.900377035 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.900537014 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.900753021 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.900780916 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.900897980 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.901097059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.901180983 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.902378082 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.902491093 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.902668953 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.902767897 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.902924061 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.903073072 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:58.943212032 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.010716915 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.015994072 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.016012907 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.016093969 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.016104937 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.016172886 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.025908947 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.069166899 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:59.070596933 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:59.188913107 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.188941956 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.188992977 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.189035892 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.189126015 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.189148903 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.189234972 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.189277887 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.189356089 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.189373016 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.189476013 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.189491987 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.189619064 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.189635038 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.190102100 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.190119028 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.190222025 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.190402031 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.190438032 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.190515041 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.348647118 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.400391102 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:59.518354893 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:59.520375013 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:59.522397041 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:59.524446011 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:59.526041031 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:59.622153997 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:56:59.638174057 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.638189077 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.638206005 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.638216019 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.638248920 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.638293028 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.638362885 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.638374090 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.638509035 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.638518095 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.638525963 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.638535023 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.638561964 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.638612032 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.639902115 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.639946938 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.640023947 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.640088081 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.640166998 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.640276909 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.640388966 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.640482903 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.641911983 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.642007113 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.642172098 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.642266035 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.642281055 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.642390966 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.642496109 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.644088030 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.644164085 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.644241095 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.644315958 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.644385099 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.644459963 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.644481897 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.645739079 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.645823956 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.646004915 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.646097898 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.646181107 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:56:59.741683960 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.048455954 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.089766026 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.103449106 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:00.134533882 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:00.134697914 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:00.136188984 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:00.254159927 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.254178047 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.254291058 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.254314899 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.254472017 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.254484892 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.254543066 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.254555941 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.254645109 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.254657030 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.254702091 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.254745960 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.254844904 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.254868031 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.255870104 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.256031036 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.256047010 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.256148100 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.256247997 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.256272078 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.292071104 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:00.293975115 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:00.295708895 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:00.297570944 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:00.298824072 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:00.411788940 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.411813021 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.411904097 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.411984921 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.412009954 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.412033081 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.412089109 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.412111044 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.412199020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.412223101 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.412328959 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.412341118 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.412441969 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.412455082 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.413496017 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.413541079 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.413650990 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.413732052 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.413786888 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.413985014 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.414113998 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.414127111 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.415357113 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.415580034 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.415657043 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.415751934 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.415851116 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.415863037 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.417186022 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.417285919 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.417407990 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.417460918 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.417503119 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.417656898 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.417669058 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.418365955 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.418509960 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.418544054 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.418644905 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.418718100 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.635088921 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:00.754746914 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.836806059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:00.884763956 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:00.987798929 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:00.989927053 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:00.991982937 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:00.994039059 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:00.995520115 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:01.058280945 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.102127075 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:01.103696108 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:01.107706070 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.107769966 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.107800961 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.107829094 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.107877016 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.107904911 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.107953072 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.108006001 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.108087063 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.108115911 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.108254910 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.108284950 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.108335018 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.108362913 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.109587908 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.109616041 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.109733105 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.109802008 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.109874010 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.109942913 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.110095024 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.110122919 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.111577034 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.111692905 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.111742020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.111851931 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.111959934 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.112080097 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.112107992 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.113646984 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.113754034 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.113842010 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.113935947 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.113986015 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.114067078 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.114115000 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.115366936 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.115416050 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.115546942 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.115617990 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.115645885 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.221837997 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.221856117 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.221985102 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.221997976 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.222038031 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.222050905 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.222129107 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.222141981 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.222223997 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.222237110 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.222280979 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.222295046 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.222357988 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.222372055 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.223190069 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.223268986 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.223356962 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.223417997 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.223500967 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.223627090 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.535239935 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.587872028 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:01.645193100 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:01.647334099 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:01.649449110 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:01.650845051 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:01.651681900 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:01.653275967 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:01.764843941 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.764878988 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.764930964 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.765016079 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.765029907 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.765044928 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.765127897 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.765141964 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.765178919 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.765201092 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.765248060 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.765271902 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.765362024 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.765374899 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.766843081 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.766876936 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.766973019 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.767260075 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.767395020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.767492056 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.767649889 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.767712116 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.769119024 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.769208908 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.769331932 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.769412994 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.769458055 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.769558907 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.769635916 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.770355940 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.771327972 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.771440029 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.771569014 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.771725893 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.771807909 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.771924973 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.772119045 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.773060083 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.773112059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.773205996 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.773250103 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:01.773341894 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.072743893 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.119105101 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:02.130505085 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:02.131932974 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:02.190301895 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.244108915 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:02.250251055 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.250310898 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.250355959 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.250420094 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.250461102 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.250561953 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.250579119 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.250600100 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.250660896 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.250695944 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.250763893 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.250809908 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.250922918 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.250937939 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.251509905 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.251614094 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.251816034 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.251849890 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.251970053 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.252005100 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.331659079 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:02.333674908 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:02.369710922 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:02.371778965 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:02.373146057 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:02.452609062 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.452645063 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.452754021 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.452814102 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.452828884 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.453174114 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.453190088 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.453286886 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.453322887 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.453368902 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.453414917 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.453617096 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.453645945 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.453660011 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.453696966 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.453723907 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.454236984 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.498936892 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.862531900 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:02.876667023 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:02.931583881 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:02.982215881 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.057302952 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:03.059171915 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:03.061141968 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:03.063124895 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:03.065013885 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:03.177139997 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.177185059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.177239895 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.177267075 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.177295923 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.177323103 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.177396059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.177443981 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.177470922 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.177498102 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.177547932 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.177575111 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.177602053 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.177628994 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.178750038 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.178800106 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.178828001 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.178956985 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.179017067 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.179064989 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.179204941 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.179231882 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.180780888 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.180830002 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.180973053 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.181035995 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.181082964 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.181129932 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.181179047 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.182712078 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.182807922 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.182862997 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.182929993 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.183016062 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.183126926 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.183140039 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.184577942 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.184637070 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.184792042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.184870958 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.184963942 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.185098886 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.185121059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.284935951 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.319005966 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:03.320461988 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:03.439048052 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.439069033 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.439085007 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.439109087 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.439202070 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.439239025 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.439373970 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.439385891 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.439490080 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.439506054 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.439630985 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.439642906 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.439747095 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.439769030 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.440045118 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.440076113 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.440180063 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.440267086 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.440453053 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.440465927 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.612591028 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.666050911 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:03.753521919 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:03.755675077 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:03.757765055 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:03.760066032 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:03.761420965 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:03.869666100 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:03.873245001 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.873275042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.873289108 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.873301983 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.873353958 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.873398066 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.873508930 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.873522043 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.873533964 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.873555899 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.873625994 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.873646021 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.873737097 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.873749971 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.875344992 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.875360012 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.875381947 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.875463963 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.875536919 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.875587940 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.875683069 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.875706911 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.877382994 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.877490044 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.877580881 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.877626896 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.877695084 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.877763987 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.877811909 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.879662991 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.879715919 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.879810095 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.879838943 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.880050898 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.880187035 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.880198956 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.881011963 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.881068945 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.881167889 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.881270885 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.881283045 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:03.989259005 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.359401941 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.359419107 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.400358915 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:04.400512934 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:04.431190968 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:04.431232929 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:04.432818890 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:04.539115906 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:04.541165113 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:04.543260098 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:04.545440912 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:04.546838045 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:04.550829887 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.550860882 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.550977945 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.551001072 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.551023006 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.551035881 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.551156998 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.551170111 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.551182985 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.551237106 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.551381111 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.551429033 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.551492929 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.551505089 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.552309036 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.552440882 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.552485943 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.552656889 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.552738905 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.552761078 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.658659935 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.658720016 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.658771992 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.658787966 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.658821106 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.658921003 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.658962965 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.658977985 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.659012079 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.659133911 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.659188986 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.659240961 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.659303904 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.659327030 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.660799980 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.660865068 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.660948992 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.661004066 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.661037922 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.661135912 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.661221027 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.661243916 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.662817955 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.662909031 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.663039923 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.663124084 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.663229942 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.663326979 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.663347006 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.665229082 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.665374041 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.665483952 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.665503025 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.665602922 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.665708065 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.665723085 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.666390896 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.666511059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.666603088 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.666696072 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.666719913 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:04.885349989 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:05.004827976 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.092173100 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.134733915 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:05.252310991 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:05.255069971 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:05.258076906 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:05.260813951 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:05.262183905 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:05.307286978 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.349421024 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:05.350960970 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:05.372347116 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.372994900 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.373012066 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.373028994 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.373089075 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.373121023 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.373147964 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.373714924 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.373743057 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.373790026 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.373846054 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.374435902 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.374488115 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.374502897 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.375436068 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.375451088 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.375510931 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.376013994 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.376055956 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.376807928 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.376924038 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.376940012 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.378465891 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.378540993 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.378998995 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.379117012 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.379631042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.379784107 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.379815102 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.380923986 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.381449938 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.381524086 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.381776094 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.381901979 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.382196903 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.382211924 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.382311106 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.382409096 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.382545948 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.382673025 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.382707119 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.469877958 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.469914913 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.469997883 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.470036983 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.470128059 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.470155001 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.470196962 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.470266104 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.470390081 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.470406055 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.470493078 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.470509052 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.470582962 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.470597982 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.470995903 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.471122026 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.471227884 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.471282959 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.471381903 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.471435070 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.798594952 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:05.853507042 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:05.901034117 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:05.944870949 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:05.946909904 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:05.949044943 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:05.951153994 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:05.952557087 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:06.020843029 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.067331076 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.067464113 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.067481041 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.067568064 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.067583084 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.067599058 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.067615032 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.067887068 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.067903042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.067924976 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.067939997 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.068022966 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.068039894 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.068054914 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.069211006 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.069382906 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.069533110 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.069555998 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.069571972 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.069662094 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.069822073 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.069837093 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.071441889 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.071595907 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.071610928 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.071933985 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.071949005 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.071964979 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.072082996 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.073801041 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.073817015 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.073832035 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.073966980 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.082942963 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.126255035 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.141977072 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.143241882 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.190037012 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.190054893 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.190157890 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.190346003 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.324815035 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.365753889 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:06.367137909 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:06.486885071 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.486970901 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.487025023 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.487054110 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.487082005 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.488543987 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.488571882 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.488642931 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.488671064 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.490350008 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.490398884 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.490467072 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.490518093 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.490545034 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.490704060 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.490731955 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.498039007 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.521900892 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.572321892 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:06.642522097 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:06.645462990 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:06.648410082 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:06.651324034 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:06.652672052 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:06.762161016 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.762243032 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.762271881 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.762304068 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.762471914 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.762525082 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.762655973 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.762690067 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.762811899 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.762840033 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.762917042 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.762965918 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.763092041 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.763118982 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.765048981 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.765100002 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.765132904 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.765599966 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.765631914 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.765839100 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.765888929 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.765918016 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.768016100 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.768183947 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.768218994 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.768285990 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.768584013 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.768649101 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.768681049 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.770972013 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.771006107 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.771145105 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.771177053 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.771399975 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.771447897 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.771476030 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.772279024 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.772330046 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.772537947 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.772659063 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.772691965 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:06.869860888 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:06.989363909 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.189142942 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.244134903 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:07.292737007 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.326808929 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:07.328896046 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:07.330935955 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:07.332968950 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:07.334306955 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:07.337857962 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:07.342374086 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:07.344532013 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:07.446468115 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.446526051 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.446556091 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.446583986 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.446614981 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.446744919 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.446772099 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.446806908 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.446855068 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.447101116 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.447128057 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.447197914 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.447225094 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.447257996 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.448487043 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.448575020 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.448693991 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.448936939 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.449053049 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.449166059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.449266911 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.449295044 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.450578928 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.450663090 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.450860023 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.451024055 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.451055050 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.451132059 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.451164007 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.452896118 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.453068018 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.453118086 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.453186989 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.453305006 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.453424931 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.453480005 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.453932047 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.453982115 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.454206944 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.454312086 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.454344034 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.461990118 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.462042093 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.462073088 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.462120056 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.462152004 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.462377071 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.462404966 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.462532043 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.462558985 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.462626934 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.462677002 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.462776899 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.462805033 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.462852955 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.464155912 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.464437008 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.464653015 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.464854002 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.465027094 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.465152025 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.807239056 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:07.872375965 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:07.916006088 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:07.926784992 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.018124104 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:08.020436049 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:08.022770882 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:08.025082111 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:08.027425051 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:08.137919903 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.137936115 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.138036013 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.138046026 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.138145924 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.138165951 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.138295889 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.138305902 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.138377905 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.138396025 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.138488054 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.138544083 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.138586044 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.138617039 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.139990091 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.140008926 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.140115976 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.141357899 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.142371893 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.142471075 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.142568111 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.142700911 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.142828941 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.142899036 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.142944098 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.144843102 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.144972086 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.145040989 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.145139933 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.145199060 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.145350933 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.145359993 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.147047997 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.147156000 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.147274971 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.147372961 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.147418022 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.229254961 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.272219896 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:08.273642063 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:08.392035007 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.392061949 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.392082930 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.392110109 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.392199039 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.392219067 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.392342091 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.392353058 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.392436028 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.392446995 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.392524004 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.392534971 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.392596960 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.392617941 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.393173933 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.393285990 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.393296957 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.393394947 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.393522024 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.393579006 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.565321922 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.619143009 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:08.686691999 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:08.688771009 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:08.690856934 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:08.693011045 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:08.694823027 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:08.713960886 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:08.807195902 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.807240963 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.807420015 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.807450056 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.807532072 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.807560921 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.807692051 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.807719946 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.807748079 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.807873964 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.807902098 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.807996988 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.808024883 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.808053017 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.809175014 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.809202909 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.809319973 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.809348106 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.809638023 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.809665918 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.809716940 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.811250925 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.811347008 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.811431885 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.811460018 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.811589003 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.811749935 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.811794043 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.813314915 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.813344002 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.813371897 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.813458920 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.813489914 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.813519001 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.813548088 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.815045118 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.815351963 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.815381050 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.815507889 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.815536976 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.815634966 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:08.833487034 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.135977983 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.180587053 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:09.182399035 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:09.241727114 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.290991068 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:09.301325083 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.301367044 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.301397085 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.301424026 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.301732063 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.301759958 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.301788092 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.301815033 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.301867962 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.301894903 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.301940918 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.301969051 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.302532911 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.302560091 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.302648067 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.302675009 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.304233074 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.304266930 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.304296017 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.304325104 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.383982897 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:09.386182070 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:09.388174057 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:09.390162945 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:09.391460896 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:09.504549980 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.504570007 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.504582882 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.504595041 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.504611015 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.504622936 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.504662991 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.504676104 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.504828930 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.504841089 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.504978895 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.504992008 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.505002975 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.505080938 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.506299019 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.506310940 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.506707907 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.506823063 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.506835938 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.506848097 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.506859064 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.506871939 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.508136988 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.508764029 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.508786917 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.508800030 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.508811951 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.509088993 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.509464979 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.510454893 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.510468006 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.510489941 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.510502100 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.510514021 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.510777950 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.511287928 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.511768103 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.511780977 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.511792898 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.511908054 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.511919975 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.588134050 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:09.707861900 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.927711010 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:09.978523016 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:10.010483980 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.025743008 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:10.028762102 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:10.031615019 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:10.034709930 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:10.036771059 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:10.054161072 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:10.055756092 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:10.145504951 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.145550966 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.145607948 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.145637035 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.145663977 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.145690918 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.145747900 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.145775080 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.145822048 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.145850897 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.145876884 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.145981073 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.146008015 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.146039009 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.148350954 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.148381948 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.148542881 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.148576021 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.148622990 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.148782015 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.148917913 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.148950100 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.151206017 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.151285887 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.151449919 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.151592970 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.151684999 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.151813030 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.151843071 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.154366016 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.154510975 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.154666901 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.155877113 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.155934095 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.157015085 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.157046080 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.157754898 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.157861948 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.158411026 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.158912897 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.160193920 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.174026966 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.174096107 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.174168110 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.174278021 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.174307108 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.174334049 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.174381018 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.174407959 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.174454927 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.174482107 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.174509048 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.174537897 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.174582958 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.174613953 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.175298929 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.175347090 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.175379038 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.175607920 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.175649881 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.175771952 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.447506905 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:10.568074942 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.569339037 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.619169950 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:10.712743044 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:10.714900017 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:10.716985941 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:10.719085932 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:10.720468044 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:10.834429979 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.834445953 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.834494114 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.834503889 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.834534883 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.836113930 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.836144924 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.836250067 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.836258888 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.837876081 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.837905884 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.838032007 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.838043928 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.838053942 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.839660883 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.839692116 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.839787960 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.841655016 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.841697931 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.843991995 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.844118118 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.844136000 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.845295906 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.845403910 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.846550941 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.846631050 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.847728968 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.847847939 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.847867966 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.849266052 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.849359989 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.851285934 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.851371050 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.851433992 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.851562977 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.851596117 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.851686001 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.851805925 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.851866007 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.851969004 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.851979971 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.870449066 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:10.911544085 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:10.912998915 CET497416092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:11.031444073 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.031482935 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.031534910 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.031563044 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.031635046 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.031687975 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.031754017 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.031780958 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.031831980 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.031860113 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.031908035 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.031935930 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.031982899 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.032010078 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.032645941 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.032695055 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.032859087 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.033019066 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.033206940 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.033256054 CET609249741154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.268229961 CET609249742154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.275818110 CET497406092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:11.322266102 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:11.395514011 CET609249740154.216.16.54192.168.2.4
                                  Nov 21, 2024 08:57:11.415724039 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:11.417864084 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:11.419969082 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:11.422019005 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:11.423368931 CET497426092192.168.2.4154.216.16.54
                                  Nov 21, 2024 08:57:11.535459042 CET609249742154.216.16.54192.168.2.4
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Nov 21, 2024 08:56:16.526057959 CET192.168.2.41.1.1.10xa706Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Nov 21, 2024 08:56:16.761049032 CET1.1.1.1192.168.2.40xa706No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.449734178.237.33.50805888C:\ProgramData\Remcos\remcos.exe
                                  TimestampBytes transferredDirectionData
                                  Nov 21, 2024 08:56:16.889683962 CET71OUTGET /json.gp HTTP/1.1
                                  Host: geoplugin.net
                                  Cache-Control: no-cache
                                  Nov 21, 2024 08:56:18.131014109 CET1170INHTTP/1.1 200 OK
                                  date: Thu, 21 Nov 2024 07:56:17 GMT
                                  server: Apache
                                  content-length: 962
                                  content-type: application/json; charset=utf-8
                                  cache-control: public, max-age=300
                                  access-control-allow-origin: *
                                  Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 37 35 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                  Data Ascii: { "geoplugin_request":"8.46.123.75", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:02:55:58
                                  Start date:21/11/2024
                                  Path:C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe"
                                  Imagebase:0x5e0000
                                  File size:1'231'368 bytes
                                  MD5 hash:08B5FA6876E0DC8D5C226597D89E646B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1726400682.0000000004515000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1726400682.0000000004515000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1726400682.0000000004515000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1726400682.0000000004515000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1726400682.0000000003A09000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1726400682.0000000003A09000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1726400682.0000000003A09000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1726400682.0000000003A09000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:02:55:59
                                  Start date:21/11/2024
                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe"
                                  Imagebase:0x1f0000
                                  File size:433'152 bytes
                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:2
                                  Start time:02:55:59
                                  Start date:21/11/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:3
                                  Start time:02:55:59
                                  Start date:21/11/2024
                                  Path:C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe"
                                  Imagebase:0x5a0000
                                  File size:1'231'368 bytes
                                  MD5 hash:08B5FA6876E0DC8D5C226597D89E646B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.1724701599.0000000000C3A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                  • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                  • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                  Reputation:low
                                  Has exited:true

                                  Target ID:4
                                  Start time:02:55:59
                                  Start date:21/11/2024
                                  Path:C:\ProgramData\Remcos\remcos.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\ProgramData\Remcos\remcos.exe"
                                  Imagebase:0xc90000
                                  File size:1'231'368 bytes
                                  MD5 hash:08B5FA6876E0DC8D5C226597D89E646B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Antivirus matches:
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 39%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:5
                                  Start time:02:56:01
                                  Start date:21/11/2024
                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Remcos\remcos.exe"
                                  Imagebase:0x1f0000
                                  File size:433'152 bytes
                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:02:56:01
                                  Start date:21/11/2024
                                  Path:C:\ProgramData\Remcos\remcos.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\ProgramData\Remcos\remcos.exe"
                                  Imagebase:0x600000
                                  File size:1'231'368 bytes
                                  MD5 hash:08B5FA6876E0DC8D5C226597D89E646B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.1736104866.0000000000CD7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:7
                                  Start time:02:56:01
                                  Start date:21/11/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:8
                                  Start time:02:56:02
                                  Start date:21/11/2024
                                  Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  Wow64 process (32bit):true
                                  Commandline:"c:\program files (x86)\internet explorer\iexplore.exe"
                                  Imagebase:0x220000
                                  File size:828'368 bytes
                                  MD5 hash:6F0F06D6AB125A99E43335427066A4A1
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:false

                                  Target ID:9
                                  Start time:02:56:04
                                  Start date:21/11/2024
                                  Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                  Imagebase:0x7ff693ab0000
                                  File size:496'640 bytes
                                  MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                  Has elevated privileges:true
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:10
                                  Start time:02:56:11
                                  Start date:21/11/2024
                                  Path:C:\ProgramData\Remcos\remcos.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\ProgramData\Remcos\remcos.exe"
                                  Imagebase:0xb60000
                                  File size:1'231'368 bytes
                                  MD5 hash:08B5FA6876E0DC8D5C226597D89E646B
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:11
                                  Start time:02:56:12
                                  Start date:21/11/2024
                                  Path:C:\ProgramData\Remcos\remcos.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\ProgramData\Remcos\remcos.exe"
                                  Imagebase:0xd80000
                                  File size:1'231'368 bytes
                                  MD5 hash:08B5FA6876E0DC8D5C226597D89E646B
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.2956392919.0000000001417000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.2957635105.000000000304F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:15
                                  Start time:02:56:19
                                  Start date:21/11/2024
                                  Path:C:\ProgramData\Remcos\remcos.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\ProgramData\Remcos\remcos.exe"
                                  Imagebase:0xfc0000
                                  File size:1'231'368 bytes
                                  MD5 hash:08B5FA6876E0DC8D5C226597D89E646B
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:16
                                  Start time:02:56:20
                                  Start date:21/11/2024
                                  Path:C:\ProgramData\Remcos\remcos.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\ProgramData\Remcos\remcos.exe"
                                  Imagebase:0x1d0000
                                  File size:1'231'368 bytes
                                  MD5 hash:08B5FA6876E0DC8D5C226597D89E646B
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:17
                                  Start time:02:56:20
                                  Start date:21/11/2024
                                  Path:C:\ProgramData\Remcos\remcos.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\ProgramData\Remcos\remcos.exe"
                                  Imagebase:0x800000
                                  File size:1'231'368 bytes
                                  MD5 hash:08B5FA6876E0DC8D5C226597D89E646B
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000002.1921104180.00000000010B7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:18
                                  Start time:02:56:27
                                  Start date:21/11/2024
                                  Path:C:\ProgramData\Remcos\remcos.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\ProgramData\Remcos\remcos.exe"
                                  Imagebase:0x340000
                                  File size:1'231'368 bytes
                                  MD5 hash:08B5FA6876E0DC8D5C226597D89E646B
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:19
                                  Start time:02:56:28
                                  Start date:21/11/2024
                                  Path:C:\ProgramData\Remcos\remcos.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\ProgramData\Remcos\remcos.exe"
                                  Imagebase:0x110000
                                  File size:1'231'368 bytes
                                  MD5 hash:08B5FA6876E0DC8D5C226597D89E646B
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:20
                                  Start time:02:56:28
                                  Start date:21/11/2024
                                  Path:C:\ProgramData\Remcos\remcos.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\ProgramData\Remcos\remcos.exe"
                                  Imagebase:0x970000
                                  File size:1'231'368 bytes
                                  MD5 hash:08B5FA6876E0DC8D5C226597D89E646B
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000014.00000002.2000409352.00000000010C7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:24
                                  Start time:02:57:36
                                  Start date:21/11/2024
                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5888 -s 1980
                                  Imagebase:0xae0000
                                  File size:483'680 bytes
                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:8.5%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:41
                                    Total number of Limit Nodes:1
                                    execution_graph 27480 2994668 27481 299467a 27480->27481 27482 2994686 27481->27482 27484 2994779 27481->27484 27485 299479d 27484->27485 27489 2994888 27485->27489 27493 2994879 27485->27493 27490 29948af 27489->27490 27491 299498c 27490->27491 27497 29944b0 27490->27497 27491->27491 27494 2994888 27493->27494 27495 299498c 27494->27495 27496 29944b0 CreateActCtxA 27494->27496 27496->27495 27498 2995918 CreateActCtxA 27497->27498 27500 29959db 27498->27500 27466 299ac50 27467 299ac5f 27466->27467 27470 299ad38 27466->27470 27475 299ad48 27466->27475 27471 299ad7c 27470->27471 27472 299ad59 27470->27472 27471->27467 27472->27471 27473 299af80 GetModuleHandleW 27472->27473 27474 299afad 27473->27474 27474->27467 27476 299ad7c 27475->27476 27477 299ad59 27475->27477 27476->27467 27477->27476 27478 299af80 GetModuleHandleW 27477->27478 27479 299afad 27478->27479 27479->27467 27501 299cfe0 27502 299d026 27501->27502 27506 299d5b8 27502->27506 27509 299d5c8 27502->27509 27503 299d113 27512 299d21c 27506->27512 27510 299d5f6 27509->27510 27511 299d21c DuplicateHandle 27509->27511 27510->27503 27511->27510 27513 299d630 DuplicateHandle 27512->27513 27514 299d5f6 27513->27514 27514->27503 27515 4f94040 27516 4f94082 27515->27516 27518 4f94089 27515->27518 27517 4f940da CallWindowProcW 27516->27517 27516->27518 27517->27518
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1731428717.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4f90000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (o^q$(o^q$,bq$,bq$Hbq
                                    • API String ID: 0-3486158592
                                    • Opcode ID: c31e1ceb0176c21ab21e7dcddbef9ada951bf29cfebf79e7d4b2ab8076765858
                                    • Instruction ID: 1b921c1ffe4433ed4613db90109ca6ce135d75d4f0f180cb8cf2ed31a0627534
                                    • Opcode Fuzzy Hash: c31e1ceb0176c21ab21e7dcddbef9ada951bf29cfebf79e7d4b2ab8076765858
                                    • Instruction Fuzzy Hash: 8E524E35B001159FEF18DF69D488A6D7BF6BF88350B158169E816DB3A1DB31EC42CB90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1731428717.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4f90000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f3d16860cb1cccda5aeda5d9409485176b26774f1581f760bc030f1358fd95ca
                                    • Instruction ID: 4b93a6f51639c0b9db5ba5d2305b65b81bd693c6cc401957865a5478e0028357
                                    • Opcode Fuzzy Hash: f3d16860cb1cccda5aeda5d9409485176b26774f1581f760bc030f1358fd95ca
                                    • Instruction Fuzzy Hash: 2662CA74E00219CFEB54DF69C894A9DBBB2FF89304F1185A9D409AB365DB30AD85CF50
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1731428717.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4f90000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 61829fbe4c4650afba9ccf87363b121adc1e329afec31aeeb64c28d82a8ff325
                                    • Instruction ID: c1ce137e569e3d730bb8ad12bdfd12b82a4e93348998c34bf38f1639e0d51ab2
                                    • Opcode Fuzzy Hash: 61829fbe4c4650afba9ccf87363b121adc1e329afec31aeeb64c28d82a8ff325
                                    • Instruction Fuzzy Hash: DF529774A00218CFEB54DF69C894A9DBBB2FF89304F1185A9D409AB365DB30AD86CF51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 547 299ad48-299ad57 548 299ad59-299ad66 call 299a06c 547->548 549 299ad83-299ad87 547->549 555 299ad68 548->555 556 299ad7c 548->556 551 299ad89-299ad93 549->551 552 299ad9b-299addc 549->552 551->552 558 299ade9-299adf7 552->558 559 299adde-299ade6 552->559 602 299ad6e call 299afd0 555->602 603 299ad6e call 299afe0 555->603 556->549 560 299adf9-299adfe 558->560 561 299ae1b-299ae1d 558->561 559->558 564 299ae09 560->564 565 299ae00-299ae07 call 299a078 560->565 563 299ae20-299ae27 561->563 562 299ad74-299ad76 562->556 566 299aeb8-299af78 562->566 568 299ae29-299ae31 563->568 569 299ae34-299ae3b 563->569 570 299ae0b-299ae19 564->570 565->570 597 299af7a-299af7d 566->597 598 299af80-299afab GetModuleHandleW 566->598 568->569 573 299ae48-299ae51 call 299a088 569->573 574 299ae3d-299ae45 569->574 570->563 578 299ae5e-299ae63 573->578 579 299ae53-299ae5b 573->579 574->573 580 299ae81-299ae85 578->580 581 299ae65-299ae6c 578->581 579->578 586 299ae8b-299ae8e 580->586 581->580 583 299ae6e-299ae7e call 299a098 call 299a0a8 581->583 583->580 588 299aeb1-299aeb7 586->588 589 299ae90-299aeae 586->589 589->588 597->598 599 299afad-299afb3 598->599 600 299afb4-299afc8 598->600 599->600 602->562 603->562
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0299AF9E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1725369873.0000000002990000.00000040.00000800.00020000.00000000.sdmp, Offset: 02990000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2990000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: c37e32eaf05a81810d601f2f3449f89ad864f0f7a9d31d09a3c37ac3df8352ff
                                    • Instruction ID: 19e5ab261e1c10ce0cfb650c144d416a1215edd28019bf0bbcbf010f031f5426
                                    • Opcode Fuzzy Hash: c37e32eaf05a81810d601f2f3449f89ad864f0f7a9d31d09a3c37ac3df8352ff
                                    • Instruction Fuzzy Hash: 89712370A00B058FDB24DF6ED44475ABBF9FF88324F10892ED48A97A50DB35E949CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 604 29944b0-29959d9 CreateActCtxA 608 29959db-29959e1 604->608 609 29959e2-2995a3c 604->609 608->609 616 2995a4b-2995a4f 609->616 617 2995a3e-2995a41 609->617 618 2995a51-2995a5d 616->618 619 2995a60-2995a90 616->619 617->616 618->619 623 2995a42-2995a47 619->623 624 2995a92-2995b14 619->624 623->616
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 029959C9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1725369873.0000000002990000.00000040.00000800.00020000.00000000.sdmp, Offset: 02990000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2990000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 7f9b37bb54ccf41a99c5cd0c65678f2b23a6da218d46c889da0b172087991481
                                    • Instruction ID: cca32a4083a28b5bf44b3cb07996bed27a3fe45d5cdfdbeecc84a025cfc9e388
                                    • Opcode Fuzzy Hash: 7f9b37bb54ccf41a99c5cd0c65678f2b23a6da218d46c889da0b172087991481
                                    • Instruction Fuzzy Hash: 2C41D2B0C00619CFEB24DFA9C844B9EBBF5BF49314F64805AD408AB255DB756945CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 627 299590c-299598c 629 299598f-29959d9 CreateActCtxA 627->629 631 29959db-29959e1 629->631 632 29959e2-2995a3c 629->632 631->632 639 2995a4b-2995a4f 632->639 640 2995a3e-2995a41 632->640 641 2995a51-2995a5d 639->641 642 2995a60-2995a90 639->642 640->639 641->642 646 2995a42-2995a47 642->646 647 2995a92-2995b14 642->647 646->639
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 029959C9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1725369873.0000000002990000.00000040.00000800.00020000.00000000.sdmp, Offset: 02990000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2990000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 66a95c92723866bd1f52cdeb184169757e2b1df89aee35403a2080d5e81a1555
                                    • Instruction ID: 0d6861f1b50591e6558b052fad26677620827f21b8d503517e83e61dfdcae4a9
                                    • Opcode Fuzzy Hash: 66a95c92723866bd1f52cdeb184169757e2b1df89aee35403a2080d5e81a1555
                                    • Instruction Fuzzy Hash: E341C1B0C00619CFDB24DFA9C9847CEBBF5BF48314F64805AD408AB265DB75698ACF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 650 4f94040-4f9407c 651 4f9412c-4f9414c 650->651 652 4f94082-4f94087 650->652 658 4f9414f-4f9415c 651->658 653 4f94089-4f940c0 652->653 654 4f940da-4f94112 CallWindowProcW 652->654 660 4f940c9-4f940d8 653->660 661 4f940c2-4f940c8 653->661 655 4f9411b-4f9412a 654->655 656 4f94114-4f9411a 654->656 655->658 656->655 660->658 661->660
                                    APIs
                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 04F94101
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1731428717.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4f90000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID: CallProcWindow
                                    • String ID:
                                    • API String ID: 2714655100-0
                                    • Opcode ID: 596c65f9592208ca458bf55e7a243ae1edd432e6b62690d68dcb811a167e4ac9
                                    • Instruction ID: 6115c3f8d28735497809831aae21b8180e52e695a944beae2e96ff2d2eda7c0a
                                    • Opcode Fuzzy Hash: 596c65f9592208ca458bf55e7a243ae1edd432e6b62690d68dcb811a167e4ac9
                                    • Instruction Fuzzy Hash: 754127B5A00309DFDB15CF99C848AAABBF5FF98314F24C459D519AB321D375A842CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 664 2995a84-2995a90 665 2995a42-2995a47 664->665 666 2995a92-2995b14 664->666 669 2995a4b-2995a4f 665->669 670 2995a51-2995a5d 669->670 671 2995a60-2995a61 669->671 670->671 671->664
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1725369873.0000000002990000.00000040.00000800.00020000.00000000.sdmp, Offset: 02990000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2990000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5cfab5867cc2670abd23840efa3f22cd012f13e82d4fc2291f75689b58696174
                                    • Instruction ID: b05f0de556528d1759273fe8f172dfce192e986afc4fca335a8070bf7f1a7cc6
                                    • Opcode Fuzzy Hash: 5cfab5867cc2670abd23840efa3f22cd012f13e82d4fc2291f75689b58696174
                                    • Instruction Fuzzy Hash: A531C170805649CFEF01CFA8C8557EEBBF0EF46314F948199C005AB265D775A94ACB51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 674 299d21c-299d6c4 DuplicateHandle 676 299d6cd-299d6ea 674->676 677 299d6c6-299d6cc 674->677 677->676
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0299D5F6,?,?,?,?,?), ref: 0299D6B7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1725369873.0000000002990000.00000040.00000800.00020000.00000000.sdmp, Offset: 02990000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2990000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: ba0099046109e4a3de5fa18280e0f667f5afe6dec5a2ca999662fe688eaf5f78
                                    • Instruction ID: 3dc1877210aa3d919a13e88c3137f7c99d554bce9a750f0af10f1980c7fef7ff
                                    • Opcode Fuzzy Hash: ba0099046109e4a3de5fa18280e0f667f5afe6dec5a2ca999662fe688eaf5f78
                                    • Instruction Fuzzy Hash: 872105B59002189FDB10DF9AD584ADEBBF8EB48320F14801AE918A7310C375A940CFA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 680 299d628-299d6c4 DuplicateHandle 681 299d6cd-299d6ea 680->681 682 299d6c6-299d6cc 680->682 682->681
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0299D5F6,?,?,?,?,?), ref: 0299D6B7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1725369873.0000000002990000.00000040.00000800.00020000.00000000.sdmp, Offset: 02990000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2990000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 8e12f23d55587fbff86c6076b3b0ed03f32f089a60a2bde1ce736dee49435088
                                    • Instruction ID: 4eaee5c810b86dcb201e0656d7c790568a64083cd8f5e1a3192bfe1947eeb14a
                                    • Opcode Fuzzy Hash: 8e12f23d55587fbff86c6076b3b0ed03f32f089a60a2bde1ce736dee49435088
                                    • Instruction Fuzzy Hash: 9B21E2B59002089FDB10DFAAD985ADEBFF5FB48320F14841AE958A7310D379A941CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 685 299af38-299af78 686 299af7a-299af7d 685->686 687 299af80-299afab GetModuleHandleW 685->687 686->687 688 299afad-299afb3 687->688 689 299afb4-299afc8 687->689 688->689
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0299AF9E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1725369873.0000000002990000.00000040.00000800.00020000.00000000.sdmp, Offset: 02990000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2990000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 1c7e938f5492ee9a85802c853d36c7d1aa0b4e9d5a93a6cae7bc4866210a458a
                                    • Instruction ID: 37ac4765444f4aece3c98acd3527996093d4b8dd8bae85c294a87e06af8994ab
                                    • Opcode Fuzzy Hash: 1c7e938f5492ee9a85802c853d36c7d1aa0b4e9d5a93a6cae7bc4866210a458a
                                    • Instruction Fuzzy Hash: 931110B6C003498FCB10CF9AD544BDEFBF8EB88324F10842AD859A7210C379A545CFA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1711983566.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_ddd000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e3e546f9b2e085f9c60af0174e3e92b03f9c522f0a0c5015cc860fb9c9e45b34
                                    • Instruction ID: 5596a224c687759f4ce9c43a5c51105d275d2c758b4cb0cde303ebd8d744e157
                                    • Opcode Fuzzy Hash: e3e546f9b2e085f9c60af0174e3e92b03f9c522f0a0c5015cc860fb9c9e45b34
                                    • Instruction Fuzzy Hash: 33212571500204DFDF15DF14D9C0B2ABF66FB98324F24C16AE9094B35AC336E856CAB2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1711983566.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_ddd000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8e5a5ca9559555027d66ea6b3923773ce606ad936fd9b64d17e9936028f01fc1
                                    • Instruction ID: c569382a29c285b1e454ed398a0288cab5b556396baf3e94b63ac3ad4a0f618f
                                    • Opcode Fuzzy Hash: 8e5a5ca9559555027d66ea6b3923773ce606ad936fd9b64d17e9936028f01fc1
                                    • Instruction Fuzzy Hash: 8921FF71544240EFCF15DF14E980B2ABF66FB98318F24C66AE8490A356C336D856CAB2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1714353823.0000000000DED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_ded000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 60f66ee3a086ee40ea91bf7a1205a22ece65f51911c7cf7087a8a5cafb8c5da8
                                    • Instruction ID: 268e2ed1f6914781503a202e08eca91a83b99ffd08661f429e311e454bfc37b9
                                    • Opcode Fuzzy Hash: 60f66ee3a086ee40ea91bf7a1205a22ece65f51911c7cf7087a8a5cafb8c5da8
                                    • Instruction Fuzzy Hash: 0621F271604280DFCB14EF15D984B26BBA6FB84314F28C569E84A4B296CB3AD847CA71
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1714353823.0000000000DED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_ded000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5bf1a7e0d2a292bfc1dd7113ea4e8d9092f7936b23f21ef0f21060a533d0c133
                                    • Instruction ID: 55c8b4446a911dc7a9633e1902e1d8d75309951c8e9b403d827e608f1540c743
                                    • Opcode Fuzzy Hash: 5bf1a7e0d2a292bfc1dd7113ea4e8d9092f7936b23f21ef0f21060a533d0c133
                                    • Instruction Fuzzy Hash: C7214971504280EFCB01EF15C5C0B2ABBA6FB84314F34C56DDA494B295CB36D846CA71
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1714353823.0000000000DED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_ded000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7b2eaf60a358a1bccf55cadfe03702151b725111d50d13a579937db72dd96b73
                                    • Instruction ID: 543c8db8f59f5abded5555657df3c4dc7e25761069327819ba6ebe8dff1280f3
                                    • Opcode Fuzzy Hash: 7b2eaf60a358a1bccf55cadfe03702151b725111d50d13a579937db72dd96b73
                                    • Instruction Fuzzy Hash: 71215E755093C08FDB12DF24D994715BF72EB46314F28C5EAD8498F6A7C33A980ACB62
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1711983566.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_ddd000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction ID: 3fa821a40036b210ca3159123758cf77b1c1ba6be8f62fe6e48d76e35ec437e5
                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction Fuzzy Hash: E211AF76504240DFDF16CF14D5C4B16BF72FB94324F28C6AAD9090B656C33AE85ACBA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1711983566.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_ddd000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction ID: ba22e4a97afa4cb55dab8fb43eb5c6a0b00d486919bdf7d58a57140827b30a15
                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction Fuzzy Hash: 7C11B176504280DFCF16CF14D5C4B16BF72FB94318F28C6AAD8490B656C336D85ACBA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1714353823.0000000000DED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DED000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_ded000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction ID: 7193a001b3aff324f1d50d826aba93b0f8b3ac83b6a3d23c610e9eb616671cca
                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction Fuzzy Hash: 0B11BB75504280DFCB02DF10C5C4B15BBA2FB84314F28C6AAD9494B296C33AD80ACB61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1711983566.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_ddd000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 364e2f4aad15edd4bb819f574aa8d803b83288b718bb52bede19eaff11f966c7
                                    • Instruction ID: 7612cc3506c55611e99cf0a542e25907b42a52a5fb65610e3696acbaf5676635
                                    • Opcode Fuzzy Hash: 364e2f4aad15edd4bb819f574aa8d803b83288b718bb52bede19eaff11f966c7
                                    • Instruction Fuzzy Hash: A701A771008340BAEB205A69DD84B67BF99EF51324F1CC5ABED4A4A386C279DC40C671
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1711983566.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_ddd000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 351124b7ae3ab0f313cdb2a7b87ffb5a6ecece9c094eb2837e2fd48449783412
                                    • Instruction ID: cdfb0e289f981d09da2f3055e9ad5e8644f7774af7b90b47d051567f8e533cf2
                                    • Opcode Fuzzy Hash: 351124b7ae3ab0f313cdb2a7b87ffb5a6ecece9c094eb2837e2fd48449783412
                                    • Instruction Fuzzy Hash: A8F06271408344AEEB208A1ADC84B62FFA8EF51724F18C45BED494E386C279AC44CAB1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1731428717.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4f90000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7eafa6a2ca690ce4c1904dd5fa20dd008270826ddfbb6240e49badf90e7beab9
                                    • Instruction ID: 4403c672f3854172d31d4059a53a36d60cbcb338929111b4ba89433648841df9
                                    • Opcode Fuzzy Hash: 7eafa6a2ca690ce4c1904dd5fa20dd008270826ddfbb6240e49badf90e7beab9
                                    • Instruction Fuzzy Hash: CC12B6B0401745EAD310CFA7E95C18A3BB1FB8531EF914649E2612F2E9DBBC994ACF44
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1725369873.0000000002990000.00000040.00000800.00020000.00000000.sdmp, Offset: 02990000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2990000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0895bdcf917bb7e7a3ac6804615a12a70a12b7e00e176cc02ae5a1860d1a586f
                                    • Instruction ID: d5fcf0dacb09e551c63941faedfd242268bc1f82d8da1dfdd3ecf1bf62949798
                                    • Opcode Fuzzy Hash: 0895bdcf917bb7e7a3ac6804615a12a70a12b7e00e176cc02ae5a1860d1a586f
                                    • Instruction Fuzzy Hash: 5EA16D32E002098FCF15DFB9C8405AEB7B6FF85315B25816AE806EB265DB31E955CF80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1731428717.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4f90000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 05c320b666717014b09744a4acd152e7aaeb92cff4137792638158a4cad71369
                                    • Instruction ID: d4cda224256f56093f45bd9f41123ded0dcb9f1a70dfe6b4b8dabe3b6ac41ba2
                                    • Opcode Fuzzy Hash: 05c320b666717014b09744a4acd152e7aaeb92cff4137792638158a4cad71369
                                    • Instruction Fuzzy Hash: ECC13BB0800745ABD710CFA7E85818A7BB1FB8531EF614349E2616F2E9DBBC584ACF44
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1731428717.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4f90000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c8c9e484c8829ad191f86f11d3e3ae1e74475fc8421c1d53405a9d0452098c35
                                    • Instruction ID: 67740849ff2f3ff4d01e27edf315212b2a70f9447b1fb1397bbec527eac891a9
                                    • Opcode Fuzzy Hash: c8c9e484c8829ad191f86f11d3e3ae1e74475fc8421c1d53405a9d0452098c35
                                    • Instruction Fuzzy Hash: 3D51FCB5E006099FEB04CFA9C880A9EBBF2FF88300F14C565E514E7255D734AA42CB54
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1731428717.0000000004F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_4f90000_ORDER AND SPECIFICATIONS.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 948511e7636fd1e823550b6e3a3e5eacc38f0148e55745cd7fd66be76310e452
                                    • Instruction ID: 817e3ff19320c3a397a37c3374b61c0e62e2cbbb411bc9501b26aa2534b3a214
                                    • Opcode Fuzzy Hash: 948511e7636fd1e823550b6e3a3e5eacc38f0148e55745cd7fd66be76310e452
                                    • Instruction Fuzzy Hash: 2C51EA74E006099FEB44DFADC880AAEBBF2FF88310F14C565E518E7255D734AA81CB54

                                    Execution Graph

                                    Execution Coverage:1.9%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:1.9%
                                    Total number of Nodes:730
                                    Total number of Limit Nodes:20
                                    execution_graph 46412 43a998 46415 43a9a4 _swprintf ___DestructExceptionObject 46412->46415 46413 43a9b2 46428 445354 20 API calls __dosmaperr 46413->46428 46415->46413 46417 43a9dc 46415->46417 46416 43a9b7 _Atexit __wsopen_s 46423 444acc EnterCriticalSection 46417->46423 46419 43a9e7 46424 43aa88 46419->46424 46423->46419 46425 43aa96 46424->46425 46425->46425 46427 43a9f2 46425->46427 46430 448416 36 API calls 2 library calls 46425->46430 46429 43aa0f LeaveCriticalSection std::_Lockit::~_Lockit 46427->46429 46428->46416 46429->46416 46430->46425 46431 402bcc 46432 402bd7 46431->46432 46433 402bdf 46431->46433 46449 403315 28 API calls _Deallocate 46432->46449 46435 402beb 46433->46435 46439 4015d3 46433->46439 46436 402bdd 46441 43360d 46439->46441 46442 402be9 46441->46442 46445 43362e std::_Facet_Register 46441->46445 46450 43a88c 46441->46450 46457 442200 7 API calls 2 library calls 46441->46457 46444 433dec std::_Facet_Register 46459 437bd7 RaiseException 46444->46459 46445->46444 46458 437bd7 RaiseException 46445->46458 46447 433e09 46449->46436 46455 446aff _strftime 46450->46455 46451 446b3d 46461 445354 20 API calls __dosmaperr 46451->46461 46452 446b28 RtlAllocateHeap 46454 446b3b 46452->46454 46452->46455 46454->46441 46455->46451 46455->46452 46460 442200 7 API calls 2 library calls 46455->46460 46457->46441 46458->46444 46459->46447 46460->46455 46461->46454 46462 4339be 46463 4339ca ___DestructExceptionObject 46462->46463 46494 4336b3 46463->46494 46465 4339d1 46466 433b24 46465->46466 46469 4339fb 46465->46469 46785 433b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 46466->46785 46468 433b2b 46786 4426be 28 API calls _Atexit 46468->46786 46478 433a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46469->46478 46779 4434d1 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 46469->46779 46471 433b31 46787 442670 28 API calls _Atexit 46471->46787 46474 433a14 46476 433a1a 46474->46476 46780 443475 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 46474->46780 46475 433b39 46484 433a9b 46478->46484 46781 43edf4 35 API calls 3 library calls 46478->46781 46505 433c5e 46484->46505 46488 433abd 46488->46468 46489 433ac1 46488->46489 46490 433aca 46489->46490 46783 442661 28 API calls _Atexit 46489->46783 46784 433842 13 API calls 2 library calls 46490->46784 46493 433ad2 46493->46476 46495 4336bc 46494->46495 46788 433e0a IsProcessorFeaturePresent 46495->46788 46497 4336c8 46789 4379ee 10 API calls 3 library calls 46497->46789 46499 4336cd 46504 4336d1 46499->46504 46790 44335e 46499->46790 46502 4336e8 46502->46465 46504->46465 46849 436050 46505->46849 46507 433c71 GetStartupInfoW 46508 433aa1 46507->46508 46509 443422 46508->46509 46850 44ddc9 46509->46850 46511 44342b 46513 433aaa 46511->46513 46854 44e0d3 35 API calls 46511->46854 46514 40d767 46513->46514 46856 41bce3 LoadLibraryA GetProcAddress 46514->46856 46516 40d783 GetModuleFileNameW 46861 40e168 46516->46861 46518 40d79f 46876 401fbd 46518->46876 46521 401fbd 28 API calls 46522 40d7bd 46521->46522 46880 41afc3 46522->46880 46526 40d7cf 46905 401d8c 46526->46905 46528 40d7d8 46529 40d835 46528->46529 46530 40d7eb 46528->46530 46911 401d64 46529->46911 47101 40e986 90 API calls 46530->47101 46533 40d845 46536 401d64 22 API calls 46533->46536 46534 40d7fd 46535 401d64 22 API calls 46534->46535 46539 40d809 46535->46539 46537 40d864 46536->46537 46916 404cbf 46537->46916 47102 40e937 65 API calls 46539->47102 46540 40d873 46920 405ce6 46540->46920 46543 40d824 47103 40e155 65 API calls 46543->47103 46544 40d87f 46923 401eef 46544->46923 46547 40d88b 46927 401eea 46547->46927 46549 40d894 46551 401eea 11 API calls 46549->46551 46550 401eea 11 API calls 46552 40dc9f 46550->46552 46553 40d89d 46551->46553 46782 433c94 GetModuleHandleW 46552->46782 46554 401d64 22 API calls 46553->46554 46555 40d8a6 46554->46555 46931 401ebd 46555->46931 46557 40d8b1 46558 401d64 22 API calls 46557->46558 46559 40d8ca 46558->46559 46560 401d64 22 API calls 46559->46560 46562 40d8e5 46560->46562 46561 40d946 46563 401d64 22 API calls 46561->46563 46579 40e134 46561->46579 46562->46561 47104 4085b4 28 API calls 46562->47104 46569 40d95d 46563->46569 46565 40d912 46566 401eef 11 API calls 46565->46566 46567 40d91e 46566->46567 46570 401eea 11 API calls 46567->46570 46568 40d9a4 46938 40bed7 46568->46938 46569->46568 46935 4124b7 RegOpenKeyExA 46569->46935 46571 40d927 46570->46571 46576 4124b7 3 API calls 46571->46576 46573 40d9aa 46574 40d82d 46573->46574 46941 41a463 46573->46941 46574->46550 46576->46561 46578 40d9c5 46581 40da18 46578->46581 46958 40697b 46578->46958 47136 412902 30 API calls 46579->47136 46580 40d988 46580->46568 47105 412902 30 API calls 46580->47105 46584 401d64 22 API calls 46581->46584 46587 40da21 46584->46587 46586 40e14a 47137 4112b5 64 API calls ___scrt_fastfail 46586->47137 46595 40da32 46587->46595 46596 40da2d 46587->46596 46590 40d9e4 47106 40699d 30 API calls 46590->47106 46591 40d9ee 46594 401d64 22 API calls 46591->46594 46603 40d9f7 46594->46603 46600 401d64 22 API calls 46595->46600 47109 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 46596->47109 46597 40d9e9 47107 4064d0 97 API calls 46597->47107 46601 40da3b 46600->46601 46962 41ae08 46601->46962 46603->46581 46606 40da13 46603->46606 46604 40da46 46966 401e18 46604->46966 47108 4064d0 97 API calls 46606->47108 46607 40da51 46970 401e13 46607->46970 46610 40da5a 46611 401d64 22 API calls 46610->46611 46612 40da63 46611->46612 46613 401d64 22 API calls 46612->46613 46614 40da7d 46613->46614 46615 401d64 22 API calls 46614->46615 46616 40da97 46615->46616 46617 401d64 22 API calls 46616->46617 46619 40dab0 46617->46619 46618 40db1d 46620 40db2c 46618->46620 46626 40dcaa ___scrt_fastfail 46618->46626 46619->46618 46621 401d64 22 API calls 46619->46621 46622 401d64 22 API calls 46620->46622 46627 40dbb1 46620->46627 46624 40dac5 _wcslen 46621->46624 46623 40db3e 46622->46623 46625 401d64 22 API calls 46623->46625 46624->46618 46628 401d64 22 API calls 46624->46628 46629 40db50 46625->46629 47112 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 46626->47112 46650 40dbac ___scrt_fastfail 46627->46650 46630 40dae0 46628->46630 46632 401d64 22 API calls 46629->46632 46633 401d64 22 API calls 46630->46633 46634 40db62 46632->46634 46635 40daf5 46633->46635 46637 401d64 22 API calls 46634->46637 46974 40c89e 46635->46974 46636 40dcef 46638 401d64 22 API calls 46636->46638 46639 40db8b 46637->46639 46640 40dd16 46638->46640 46644 401d64 22 API calls 46639->46644 47113 401f66 46640->47113 46643 401e18 11 API calls 46646 40db14 46643->46646 46648 40db9c 46644->46648 46647 401e13 11 API calls 46646->46647 46647->46618 47031 40bc67 46648->47031 46649 40dd25 47117 4126d2 14 API calls 46649->47117 46650->46627 47110 4128a2 31 API calls 46650->47110 46654 40dc45 ctype 46658 401d64 22 API calls 46654->46658 46655 40dd3b 46656 401d64 22 API calls 46655->46656 46657 40dd47 46656->46657 47118 43a5e7 39 API calls _swprintf 46657->47118 46661 40dc5c 46658->46661 46660 40dd54 46662 40dd81 46660->46662 47119 41beb0 86 API calls ___scrt_fastfail 46660->47119 46661->46636 46663 401d64 22 API calls 46661->46663 46667 401f66 28 API calls 46662->46667 46665 40dc7e 46663->46665 46668 41ae08 28 API calls 46665->46668 46666 40dd65 CreateThread 46666->46662 47332 41c96f 10 API calls 46666->47332 46669 40dd96 46667->46669 46670 40dc87 46668->46670 46672 401f66 28 API calls 46669->46672 47111 40e219 109 API calls 46670->47111 46673 40dda5 46672->46673 47120 41a686 79 API calls 46673->47120 46674 40dc8c 46674->46636 46676 40dc93 46674->46676 46676->46574 46677 40ddaa 46678 401d64 22 API calls 46677->46678 46679 40ddb6 46678->46679 46680 401d64 22 API calls 46679->46680 46681 40ddcb 46680->46681 46682 401d64 22 API calls 46681->46682 46683 40ddeb 46682->46683 47121 43a5e7 39 API calls _swprintf 46683->47121 46685 40ddf8 46686 401d64 22 API calls 46685->46686 46687 40de03 46686->46687 46688 401d64 22 API calls 46687->46688 46689 40de14 46688->46689 46690 401d64 22 API calls 46689->46690 46691 40de29 46690->46691 46692 401d64 22 API calls 46691->46692 46693 40de3a 46692->46693 46694 40de41 StrToIntA 46693->46694 47122 409517 142 API calls _wcslen 46694->47122 46696 40de53 46697 401d64 22 API calls 46696->46697 46699 40de5c 46697->46699 46698 40dea1 46701 401d64 22 API calls 46698->46701 46699->46698 47123 43360d 22 API calls 3 library calls 46699->47123 46706 40deb1 46701->46706 46702 40de71 46703 401d64 22 API calls 46702->46703 46704 40de84 46703->46704 46707 40de8b CreateThread 46704->46707 46705 40def9 46709 401d64 22 API calls 46705->46709 46706->46705 47124 43360d 22 API calls 3 library calls 46706->47124 46707->46698 47328 419128 102 API calls __EH_prolog 46707->47328 46714 40df02 46709->46714 46710 40dec6 46711 401d64 22 API calls 46710->46711 46712 40ded8 46711->46712 46717 40dedf CreateThread 46712->46717 46713 40df6c 46715 401d64 22 API calls 46713->46715 46714->46713 46716 401d64 22 API calls 46714->46716 46719 40df75 46715->46719 46718 40df1e 46716->46718 46717->46705 47333 419128 102 API calls __EH_prolog 46717->47333 46721 401d64 22 API calls 46718->46721 46720 40dfba 46719->46720 46723 401d64 22 API calls 46719->46723 47128 41a7a2 29 API calls 46720->47128 46724 40df33 46721->46724 46726 40df8a 46723->46726 47125 40c854 31 API calls 46724->47125 46725 40dfc3 46727 401e18 11 API calls 46725->46727 46731 401d64 22 API calls 46726->46731 46728 40dfce 46727->46728 46730 401e13 11 API calls 46728->46730 46733 40dfd7 CreateThread 46730->46733 46734 40df9f 46731->46734 46732 40df46 46735 401e18 11 API calls 46732->46735 46738 40e004 46733->46738 46739 40dff8 CreateThread 46733->46739 47327 40e54f 82 API calls 46733->47327 47126 43a5e7 39 API calls _swprintf 46734->47126 46737 40df52 46735->46737 46740 401e13 11 API calls 46737->46740 46741 40e019 46738->46741 46742 40e00d CreateThread 46738->46742 46739->46738 47329 410f36 138 API calls 46739->47329 46744 40df5b CreateThread 46740->46744 46746 40e073 46741->46746 46748 401f66 28 API calls 46741->46748 46742->46741 47330 411524 38 API calls ___scrt_fastfail 46742->47330 46744->46713 47331 40196b 49 API calls 46744->47331 46745 40dfac 47127 40b95c 7 API calls 46745->47127 47131 41246e RegOpenKeyExA RegQueryValueExA RegCloseKey 46746->47131 46749 40e046 46748->46749 47129 404c9e 28 API calls 46749->47129 46752 40e053 46755 401f66 28 API calls 46752->46755 46753 40e08b 46754 40e12a 46753->46754 46756 41ae08 28 API calls 46753->46756 47134 40cbac 27 API calls 46754->47134 46757 40e062 46755->46757 46759 40e0a4 46756->46759 47130 41a686 79 API calls 46757->47130 47132 412584 31 API calls 46759->47132 46761 40e12f 47135 413fd4 168 API calls 46761->47135 46762 40e067 46764 401eea 11 API calls 46762->46764 46764->46746 46766 40e0ba 46767 401e13 11 API calls 46766->46767 46770 40e0c5 46767->46770 46768 40e0ed DeleteFileW 46769 40e0f4 46768->46769 46768->46770 46771 41ae08 28 API calls 46769->46771 46770->46768 46770->46769 46772 40e0db Sleep 46770->46772 46773 40e104 46771->46773 46772->46770 47133 41297a RegOpenKeyExW RegDeleteValueW 46773->47133 46775 40e117 46776 401e13 11 API calls 46775->46776 46777 40e121 46776->46777 46778 401e13 11 API calls 46777->46778 46778->46754 46779->46474 46780->46478 46781->46484 46782->46488 46783->46490 46784->46493 46785->46468 46786->46471 46787->46475 46788->46497 46789->46499 46794 44e949 46790->46794 46793 437a17 8 API calls 3 library calls 46793->46504 46797 44e966 46794->46797 46798 44e962 46794->46798 46796 4336da 46796->46502 46796->46793 46797->46798 46800 4489ad 46797->46800 46812 433d2c 5 API calls ___raise_securityfailure 46798->46812 46801 4489b9 ___DestructExceptionObject 46800->46801 46813 444acc EnterCriticalSection 46801->46813 46803 4489c0 46814 44ef64 46803->46814 46805 4489cf 46806 4489de 46805->46806 46825 448841 23 API calls 46805->46825 46827 4489fa LeaveCriticalSection std::_Lockit::~_Lockit 46806->46827 46809 4489d9 46826 4488f7 GetStdHandle GetFileType 46809->46826 46810 4489ef __wsopen_s 46810->46797 46812->46796 46813->46803 46815 44ef70 ___DestructExceptionObject 46814->46815 46816 44ef94 46815->46816 46817 44ef7d 46815->46817 46828 444acc EnterCriticalSection 46816->46828 46836 445354 20 API calls __dosmaperr 46817->46836 46820 44efcc 46837 44eff3 LeaveCriticalSection std::_Lockit::~_Lockit 46820->46837 46821 44ef82 _Atexit __wsopen_s 46821->46805 46822 44efa0 46822->46820 46829 44eeb5 46822->46829 46825->46809 46826->46806 46827->46810 46828->46822 46838 448706 46829->46838 46831 44eec7 46835 44eed4 46831->46835 46845 44772e 11 API calls 2 library calls 46831->46845 46833 44ef26 46833->46822 46846 446ac5 20 API calls __dosmaperr 46835->46846 46836->46821 46837->46821 46839 448713 _strftime 46838->46839 46840 448753 46839->46840 46841 44873e RtlAllocateHeap 46839->46841 46847 442200 7 API calls 2 library calls 46839->46847 46848 445354 20 API calls __dosmaperr 46840->46848 46841->46839 46842 448751 46841->46842 46842->46831 46845->46831 46846->46833 46847->46839 46848->46842 46849->46507 46851 44dddb 46850->46851 46852 44ddd2 46850->46852 46851->46511 46855 44dcc8 48 API calls 5 library calls 46852->46855 46854->46511 46855->46851 46857 41bd22 LoadLibraryA GetProcAddress 46856->46857 46858 41bd12 GetModuleHandleA GetProcAddress 46856->46858 46859 41bd4b 32 API calls 46857->46859 46860 41bd3b LoadLibraryA GetProcAddress 46857->46860 46858->46857 46859->46516 46860->46859 47138 41a63f FindResourceA 46861->47138 46864 43a88c ___crtLCMapStringA 21 API calls 46865 40e192 ctype 46864->46865 47141 401f86 46865->47141 46868 401eef 11 API calls 46869 40e1b8 46868->46869 46870 401eea 11 API calls 46869->46870 46871 40e1c1 46870->46871 46872 43a88c ___crtLCMapStringA 21 API calls 46871->46872 46873 40e1d2 ctype 46872->46873 47145 406052 46873->47145 46875 40e205 46875->46518 46877 401fcc 46876->46877 47153 402501 46877->47153 46879 401fea 46879->46521 46900 41afd6 46880->46900 46881 41b046 46882 401eea 11 API calls 46881->46882 46883 41b078 46882->46883 46884 401eea 11 API calls 46883->46884 46886 41b080 46884->46886 46885 41b048 47166 403b60 28 API calls 46885->47166 46889 401eea 11 API calls 46886->46889 46891 40d7c6 46889->46891 46890 41b054 46892 401eef 11 API calls 46890->46892 46901 40e8bd 46891->46901 46894 41b05d 46892->46894 46893 401eef 11 API calls 46893->46900 46895 401eea 11 API calls 46894->46895 46897 41b065 46895->46897 46896 401eea 11 API calls 46896->46900 46899 41bfa9 28 API calls 46897->46899 46899->46881 46900->46881 46900->46885 46900->46893 46900->46896 47158 403b60 28 API calls 46900->47158 47159 41bfa9 46900->47159 46902 40e8ca 46901->46902 46904 40e8da 46902->46904 47194 40200a 11 API calls 46902->47194 46904->46526 46907 40200a 46905->46907 46906 40203a 46906->46528 46907->46906 47195 402654 11 API calls 46907->47195 46909 40202b 47196 4026ba 11 API calls _Deallocate 46909->47196 46912 401d6c 46911->46912 46913 401d74 46912->46913 47197 401fff 22 API calls 46912->47197 46913->46533 46917 404ccb 46916->46917 47198 402e78 46917->47198 46919 404cee 46919->46540 47207 404bc4 46920->47207 46922 405cf4 46922->46544 46924 401efe 46923->46924 46926 401f0a 46924->46926 47216 4021b9 11 API calls 46924->47216 46926->46547 46928 4021b9 46927->46928 46929 4021e8 46928->46929 47217 40262e 11 API calls _Deallocate 46928->47217 46929->46549 46933 401ec9 46931->46933 46932 401ee4 46932->46557 46933->46932 46934 402325 28 API calls 46933->46934 46934->46932 46936 4124e1 RegQueryValueExA RegCloseKey 46935->46936 46937 41250b 46935->46937 46936->46937 46937->46580 47218 401e8f 46938->47218 46940 40bee1 CreateMutexA GetLastError 46940->46573 47220 41b15b 46941->47220 46946 401eef 11 API calls 46947 41a49f 46946->46947 46948 401eea 11 API calls 46947->46948 46949 41a4a7 46948->46949 46950 41a4fa 46949->46950 46951 412513 31 API calls 46949->46951 46950->46578 46952 41a4cd 46951->46952 46953 41a4d8 StrToIntA 46952->46953 46954 41a4ef 46953->46954 46955 41a4e6 46953->46955 46957 401eea 11 API calls 46954->46957 47228 41c102 22 API calls 46955->47228 46957->46950 46959 40698f 46958->46959 46960 4124b7 3 API calls 46959->46960 46961 406996 46960->46961 46961->46590 46961->46591 46963 41ae1c 46962->46963 47229 40b027 46963->47229 46965 41ae24 46965->46604 46967 401e27 46966->46967 46968 401e33 46967->46968 47238 402121 11 API calls 46967->47238 46968->46607 46972 402121 46970->46972 46971 402150 46971->46610 46972->46971 47239 402718 11 API calls _Deallocate 46972->47239 46975 40c8ba 46974->46975 46976 40c8da 46975->46976 46977 40c90f 46975->46977 46978 40c8d0 46975->46978 47244 41a74b 29 API calls 46976->47244 46981 41b15b GetCurrentProcess 46977->46981 46980 40ca03 GetLongPathNameW 46978->46980 47240 403b40 46980->47240 46982 40c914 46981->46982 46985 40c918 46982->46985 46986 40c96a 46982->46986 46983 40c8e3 46987 401e18 11 API calls 46983->46987 46990 403b40 28 API calls 46985->46990 46989 403b40 28 API calls 46986->46989 47026 40c8ed 46987->47026 46993 40c978 46989->46993 46994 40c926 46990->46994 46991 403b40 28 API calls 46992 40ca27 46991->46992 47247 40cc37 28 API calls 46992->47247 46999 403b40 28 API calls 46993->46999 47000 403b40 28 API calls 46994->47000 46996 401e13 11 API calls 46996->46978 46997 40ca3a 47248 402860 28 API calls 46997->47248 47002 40c98e 46999->47002 47003 40c93c 47000->47003 47001 40ca45 47249 402860 28 API calls 47001->47249 47246 402860 28 API calls 47002->47246 47245 402860 28 API calls 47003->47245 47007 40ca4f 47010 401e13 11 API calls 47007->47010 47008 40c999 47011 401e18 11 API calls 47008->47011 47009 40c947 47012 401e18 11 API calls 47009->47012 47013 40ca59 47010->47013 47014 40c9a4 47011->47014 47015 40c952 47012->47015 47016 401e13 11 API calls 47013->47016 47017 401e13 11 API calls 47014->47017 47018 401e13 11 API calls 47015->47018 47019 40ca62 47016->47019 47020 40c9ad 47017->47020 47021 40c95b 47018->47021 47022 401e13 11 API calls 47019->47022 47023 401e13 11 API calls 47020->47023 47024 401e13 11 API calls 47021->47024 47025 40ca6b 47022->47025 47023->47026 47024->47026 47027 401e13 11 API calls 47025->47027 47026->46996 47028 40ca74 47027->47028 47029 401e13 11 API calls 47028->47029 47030 40ca7d 47029->47030 47030->46643 47032 40bc7a _wcslen 47031->47032 47033 40bc84 47032->47033 47034 40bcce 47032->47034 47037 40bc8d CreateDirectoryW 47033->47037 47035 40c89e 31 API calls 47034->47035 47036 40bce0 47035->47036 47038 401e18 11 API calls 47036->47038 47251 40856b 47037->47251 47040 40bccc 47038->47040 47042 401e13 11 API calls 47040->47042 47041 40bca9 47285 4028cf 47041->47285 47047 40bcf7 47042->47047 47044 40bcb5 47045 401e18 11 API calls 47044->47045 47046 40bcc3 47045->47046 47048 401e13 11 API calls 47046->47048 47049 40bd10 47047->47049 47050 40bd2d 47047->47050 47048->47040 47053 40bb7b 31 API calls 47049->47053 47051 40bd36 CopyFileW 47050->47051 47052 40be07 47051->47052 47054 40bd48 _wcslen 47051->47054 47257 40bb7b 47052->47257 47083 40bd21 47053->47083 47054->47052 47056 40bd64 47054->47056 47057 40bdb7 47054->47057 47060 40c89e 31 API calls 47056->47060 47059 40c89e 31 API calls 47057->47059 47064 40bdbd 47059->47064 47065 40bd6a 47060->47065 47061 40be21 47069 40be2a SetFileAttributesW 47061->47069 47062 40be4d 47063 40be95 CloseHandle 47062->47063 47066 403b40 28 API calls 47062->47066 47283 401e07 47063->47283 47067 401e18 11 API calls 47064->47067 47068 401e18 11 API calls 47065->47068 47071 40be63 47066->47071 47100 40bdb1 47067->47100 47072 40bd76 47068->47072 47082 40be39 _wcslen 47069->47082 47076 41ae08 28 API calls 47071->47076 47077 401e13 11 API calls 47072->47077 47073 40beb1 ShellExecuteW 47074 40bec4 47073->47074 47075 40bece ExitProcess 47073->47075 47078 40bed7 CreateMutexA GetLastError 47074->47078 47079 40be76 47076->47079 47081 40bd7f 47077->47081 47078->47083 47288 412774 RegCreateKeyW 47079->47288 47080 401e13 11 API calls 47084 40bdcf 47080->47084 47085 40856b 28 API calls 47081->47085 47082->47062 47086 40be4a SetFileAttributesW 47082->47086 47083->46650 47090 40bddb CreateDirectoryW 47084->47090 47087 40bd93 47085->47087 47086->47062 47088 4028cf 28 API calls 47087->47088 47092 40bd9f 47088->47092 47091 401e07 47090->47091 47094 40bdeb CopyFileW 47091->47094 47095 401e18 11 API calls 47092->47095 47094->47052 47097 40bdf8 47094->47097 47098 40bda8 47095->47098 47096 401e13 11 API calls 47096->47063 47097->47083 47099 401e13 11 API calls 47098->47099 47099->47100 47100->47080 47101->46534 47102->46543 47104->46565 47105->46568 47106->46597 47107->46591 47108->46581 47109->46595 47110->46654 47111->46674 47112->46636 47114 401f6e 47113->47114 47322 402301 47114->47322 47117->46655 47118->46660 47119->46666 47120->46677 47121->46685 47122->46696 47123->46702 47124->46710 47125->46732 47126->46745 47127->46720 47128->46725 47129->46752 47130->46762 47131->46753 47132->46766 47133->46775 47134->46761 47326 419e89 104 API calls 47135->47326 47136->46586 47139 40e183 47138->47139 47140 41a65c LoadResource LockResource SizeofResource 47138->47140 47139->46864 47140->47139 47142 401f8e 47141->47142 47148 402325 47142->47148 47144 401fa4 47144->46868 47146 401f86 28 API calls 47145->47146 47147 406066 47146->47147 47147->46875 47149 40232f 47148->47149 47151 40233a 47149->47151 47152 40294a 28 API calls 47149->47152 47151->47144 47152->47151 47154 40250d 47153->47154 47156 40252b 47154->47156 47157 40261a 28 API calls 47154->47157 47156->46879 47157->47156 47158->46900 47160 41bfae 47159->47160 47161 41bfcb 47160->47161 47163 41bfd2 47160->47163 47186 41bfe3 28 API calls 47161->47186 47167 41c552 47163->47167 47164 41bfd0 47164->46900 47166->46890 47168 41c55c __EH_prolog 47167->47168 47169 41c673 47168->47169 47170 41c595 47168->47170 47193 402649 22 API calls std::_Xinvalid_argument 47169->47193 47187 4026a7 28 API calls 47170->47187 47174 41c5a9 47188 41c536 28 API calls 47174->47188 47176 41c5dc 47177 41c603 47176->47177 47178 41c5f7 47176->47178 47190 41c7cf 11 API calls 47177->47190 47189 41c7b2 11 API calls 47178->47189 47181 41c601 47192 41c75a 11 API calls 47181->47192 47182 41c60f 47191 41c7cf 11 API calls 47182->47191 47185 41c63e 47185->47164 47186->47164 47187->47174 47188->47176 47189->47181 47190->47182 47191->47181 47192->47185 47194->46904 47195->46909 47196->46906 47199 402e85 47198->47199 47200 402e98 47199->47200 47202 402ea9 47199->47202 47203 402eae 47199->47203 47205 403445 28 API calls 47200->47205 47202->46919 47203->47202 47206 40225b 11 API calls 47203->47206 47205->47202 47206->47202 47208 404bd0 47207->47208 47211 40245c 47208->47211 47210 404be4 47210->46922 47212 402469 47211->47212 47214 402478 47212->47214 47215 402ad3 28 API calls 47212->47215 47214->47210 47215->47214 47216->46926 47217->46929 47219 401e94 47218->47219 47221 41a471 47220->47221 47222 41b168 GetCurrentProcess 47220->47222 47223 412513 RegOpenKeyExA 47221->47223 47222->47221 47224 412541 RegQueryValueExA RegCloseKey 47223->47224 47225 412569 47223->47225 47224->47225 47226 401f66 28 API calls 47225->47226 47227 41257e 47226->47227 47227->46946 47228->46954 47230 40b02f 47229->47230 47233 40b04b 47230->47233 47232 40b045 47232->46965 47234 40b055 47233->47234 47236 40b060 47234->47236 47237 40b138 28 API calls 47234->47237 47236->47232 47237->47236 47238->46968 47239->46971 47241 403b48 47240->47241 47250 403b7a 28 API calls 47241->47250 47243 403b5a 47243->46991 47244->46983 47245->47009 47246->47008 47247->46997 47248->47001 47249->47007 47250->47243 47252 408577 47251->47252 47294 402ca8 47252->47294 47256 4085a3 47256->47041 47258 40bba1 47257->47258 47259 40bbdd 47257->47259 47312 40b0dd 47258->47312 47260 40bc1e 47259->47260 47262 40b0dd 28 API calls 47259->47262 47263 40bc5f 47260->47263 47266 40b0dd 28 API calls 47260->47266 47265 40bbf4 47262->47265 47263->47061 47263->47062 47268 4028cf 28 API calls 47265->47268 47269 40bc35 47266->47269 47267 4028cf 28 API calls 47270 40bbbd 47267->47270 47271 40bbfe 47268->47271 47272 4028cf 28 API calls 47269->47272 47273 412774 14 API calls 47270->47273 47274 412774 14 API calls 47271->47274 47275 40bc3f 47272->47275 47276 40bbd1 47273->47276 47277 40bc12 47274->47277 47278 412774 14 API calls 47275->47278 47279 401e13 11 API calls 47276->47279 47280 401e13 11 API calls 47277->47280 47281 40bc53 47278->47281 47279->47259 47280->47260 47282 401e13 11 API calls 47281->47282 47282->47263 47284 401e0c 47283->47284 47318 402d8b 47285->47318 47287 4028dd 47287->47044 47289 4127c6 47288->47289 47291 412789 47288->47291 47290 401e13 11 API calls 47289->47290 47292 40be89 47290->47292 47293 4127a2 RegSetValueExW RegCloseKey 47291->47293 47292->47096 47293->47289 47295 402cb5 47294->47295 47296 402cc8 47295->47296 47298 402cd9 47295->47298 47299 402cde 47295->47299 47305 403374 28 API calls 47296->47305 47301 402de3 47298->47301 47299->47298 47306 402f21 11 API calls 47299->47306 47302 402daf 47301->47302 47307 4030f7 47302->47307 47304 402dcd 47304->47256 47305->47298 47306->47298 47308 403101 47307->47308 47310 403115 47308->47310 47311 4036c2 28 API calls 47308->47311 47310->47304 47311->47310 47313 40b0e9 47312->47313 47314 402ca8 28 API calls 47313->47314 47315 40b10c 47314->47315 47316 402de3 28 API calls 47315->47316 47317 40b11f 47316->47317 47317->47267 47319 402d97 47318->47319 47320 4030f7 28 API calls 47319->47320 47321 402dab 47320->47321 47321->47287 47323 40230d 47322->47323 47324 402325 28 API calls 47323->47324 47325 401f80 47324->47325 47325->46649 47334 411637 62 API calls 47329->47334

                                    Control-flow Graph

                                    APIs
                                    • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                    • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                    • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                    • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                    • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                    • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                    • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                    • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                    • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                    • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                    • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                    • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE09
                                    • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE16
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                                    • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE2B
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE2E
                                    • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE3B
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                                    • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE50
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE53
                                    • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE60
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$HandleLibraryLoadModule
                                    • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                    • API String ID: 384173800-625181639
                                    • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                    • Instruction ID: 894fbade80705e672e772900be83df88f70523cf1842e1027a1ce5ee2e2841b6
                                    • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                    • Instruction Fuzzy Hash: 2831EDA0E4031C7ADA107FB69C49E5B7E9CD944B953110827B508D3162FBBDA9809EEE

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 5 40d767-40d7e9 call 41bce3 GetModuleFileNameW call 40e168 call 401fbd * 2 call 41afc3 call 40e8bd call 401d8c call 43e820 22 40d835-40d8fd call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 5->22 23 40d7eb-40d830 call 40e986 call 401d64 call 401e8f call 40fcba call 40e937 call 40e155 5->23 69 40d950-40d96b call 401d64 call 40b125 22->69 70 40d8ff-40d94a call 4085b4 call 401eef call 401eea call 401e8f call 4124b7 22->70 49 40dc96-40dca7 call 401eea 23->49 79 40d9a5-40d9ac call 40bed7 69->79 80 40d96d-40d983 call 401e8f call 4124b7 69->80 70->69 102 40e134-40e154 call 401e8f call 412902 call 4112b5 70->102 88 40d9b5-40d9bc 79->88 89 40d9ae-40d9b0 79->89 95 40d988-40d98c 80->95 93 40d9c0-40d9cc call 41a463 88->93 94 40d9be 88->94 92 40dc95 89->92 92->49 103 40d9d5-40d9d9 93->103 104 40d9ce-40d9d0 93->104 94->93 95->79 98 40d98e-40d9a4 call 401e8f call 412902 95->98 98->79 107 40da18-40da2b call 401d64 call 401e8f 103->107 108 40d9db call 40697b 103->108 104->103 127 40da32-40daba call 401d64 call 41ae08 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 107->127 128 40da2d call 4069ba 107->128 118 40d9e0-40d9e2 108->118 121 40d9e4-40d9e9 call 40699d call 4064d0 118->121 122 40d9ee-40da01 call 401d64 call 401e8f 118->122 121->122 122->107 138 40da03-40da09 122->138 163 40db22-40db26 127->163 164 40dabc-40dad5 call 401d64 call 401e8f call 43a611 127->164 128->127 138->107 140 40da0b-40da11 138->140 140->107 142 40da13 call 4064d0 140->142 142->107 165 40dcaa-40dd01 call 436050 call 4022f8 call 401e8f * 2 call 41265d call 4082d7 163->165 166 40db2c-40db33 163->166 164->163 189 40dad7-40db03 call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e 164->189 220 40dd06-40dd5c call 401d64 call 401e8f call 401f66 call 401e8f call 4126d2 call 401d64 call 401e8f call 43a5e7 165->220 168 40dbb1-40dbbb call 4082d7 166->168 169 40db35-40dba7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 166->169 179 40dbc0-40dbe4 call 4022f8 call 4338c8 168->179 258 40dbac-40dbaf 169->258 196 40dbf3 179->196 197 40dbe6-40dbf1 call 436050 179->197 234 40db08-40db1d call 401e18 call 401e13 189->234 203 40dbf5-40dc6a call 401e07 call 43e349 call 4022f8 call 401e8f call 4022f8 call 401e8f call 4128a2 call 4338d1 call 401d64 call 40b125 196->203 197->203 203->220 274 40dc70-40dc91 call 401d64 call 41ae08 call 40e219 203->274 272 40dd79-40dd7b 220->272 273 40dd5e 220->273 234->163 258->179 276 40dd81 272->276 277 40dd7d-40dd7f 272->277 275 40dd60-40dd77 call 41beb0 CreateThread 273->275 274->220 292 40dc93 274->292 280 40dd87-40de66 call 401f66 * 2 call 41a686 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 275->280 276->280 277->275 330 40dea1 280->330 331 40de68-40de9f call 43360d call 401d64 call 401e8f CreateThread 280->331 292->92 333 40dea3-40debb call 401d64 call 401e8f 330->333 331->333 342 40def9-40df0c call 401d64 call 401e8f 333->342 343 40debd-40def4 call 43360d call 401d64 call 401e8f CreateThread 333->343 353 40df6c-40df7f call 401d64 call 401e8f 342->353 354 40df0e-40df67 call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 CreateThread 342->354 343->342 365 40df81-40dfb5 call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 40b95c 353->365 366 40dfba-40dfde call 41a7a2 call 401e18 call 401e13 353->366 354->353 365->366 386 40dfe0 366->386 387 40dfe3-40dff6 CreateThread 366->387 386->387 390 40e004-40e00b 387->390 391 40dff8-40e002 CreateThread 387->391 394 40e019-40e020 390->394 395 40e00d-40e017 CreateThread 390->395 391->390 398 40e022-40e025 394->398 399 40e033-40e038 394->399 395->394 402 40e073-40e08e call 401e8f call 41246e 398->402 403 40e027-40e031 398->403 401 40e03d-40e06e call 401f66 call 404c9e call 401f66 call 41a686 call 401eea 399->401 401->402 413 40e094-40e0d4 call 41ae08 call 401e07 call 412584 call 401e13 call 401e07 402->413 414 40e12a-40e12f call 40cbac call 413fd4 402->414 403->401 433 40e0ed-40e0f2 DeleteFileW 413->433 414->102 434 40e0f4-40e125 call 41ae08 call 401e07 call 41297a call 401e13 * 2 433->434 435 40e0d6-40e0d9 433->435 434->414 435->434 437 40e0db-40e0e8 Sleep call 401e07 435->437 437->433
                                    APIs
                                      • Part of subcall function 0041BCE3: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                      • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                      • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                      • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                      • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                      • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                      • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                      • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                      • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                      • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                      • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                      • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                      • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                      • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                      • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                      • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe,00000104), ref: 0040D790
                                      • Part of subcall function 0040FCBA: __EH_prolog.LIBCMT ref: 0040FCBF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                    • String ID: (CG$(CG$0DG$@CG$@CG$Access Level: $Administrator$C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe$Exe$Inj$Remcos Agent initialized$Software\$User$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$`=G$dCG$del$del$exepath$licence$license_code.txt$BG$BG$BG$BG$BG
                                    • API String ID: 2830904901-226060477
                                    • Opcode ID: c1e652fdcdadacd5fa8a79e94a732036c9c3293ce87134648a9a308d28ae3e8a
                                    • Instruction ID: 4071723a11783d2da8da933f82134b9c6f3815e49c8d87d463163304bf45e319
                                    • Opcode Fuzzy Hash: c1e652fdcdadacd5fa8a79e94a732036c9c3293ce87134648a9a308d28ae3e8a
                                    • Instruction Fuzzy Hash: 4032A360B043406ADA18B776DC57BBE269A8FC1748F04443FB8467B2E2DE7C9D45839E

                                    Control-flow Graph

                                    APIs
                                    • _wcslen.LIBCMT ref: 0040BC75
                                    • CreateDirectoryW.KERNELBASE(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                                    • CopyFileW.KERNELBASE(C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                                    • _wcslen.LIBCMT ref: 0040BD54
                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe,00000000,00000000), ref: 0040BDF2
                                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                                    • _wcslen.LIBCMT ref: 0040BE34
                                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                                    • ExitProcess.KERNEL32 ref: 0040BED0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                    • String ID: 6$C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe$del$open$BG$BG
                                    • API String ID: 1579085052-4225657995
                                    • Opcode ID: 1dfc8a95e9f2fa8f15eef755b153a8034996a407d8c67b2864cbd51f99b60f53
                                    • Instruction ID: b3868b96a5a73c1b880f625a38b4c220dd420420d05b0a2cc1e840e3cd02b35d
                                    • Opcode Fuzzy Hash: 1dfc8a95e9f2fa8f15eef755b153a8034996a407d8c67b2864cbd51f99b60f53
                                    • Instruction Fuzzy Hash: D251B0212043406BD609B722EC52EBF77999F81719F10443FF985A66E2DF3CAD4582EE

                                    Control-flow Graph

                                    APIs
                                    • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040CA04
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LongNamePath
                                    • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                    • API String ID: 82841172-425784914
                                    • Opcode ID: c2d06ea8c2a66cf5c705706c372c41cf9f81b2c3d5dea1c7eec24b750922d7eb
                                    • Instruction ID: 51cedb133b73bca78a9fc1065318242b3d6e678e936cb09da4a185c9a299c852
                                    • Opcode Fuzzy Hash: c2d06ea8c2a66cf5c705706c372c41cf9f81b2c3d5dea1c7eec24b750922d7eb
                                    • Instruction Fuzzy Hash: 39413A721442009BC214FB21DD96DAFB7A4AE90759F10063FB546720E2EE7CAA49C69F

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                      • Part of subcall function 00412513: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                                      • Part of subcall function 00412513: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                                      • Part of subcall function 00412513: RegCloseKey.KERNELBASE(?), ref: 0041255F
                                    • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4D9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCurrentOpenProcessQueryValue
                                    • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                    • API String ID: 1866151309-2070987746
                                    • Opcode ID: c28e8bf06c7bd464c54825a7174b2fee0dd0f803164bd22ac966e04bdcbe38d4
                                    • Instruction ID: 19977b185b3bcff34fa520d2ecc4782d624f476aadfe6515b429a208ce335d2f
                                    • Opcode Fuzzy Hash: c28e8bf06c7bd464c54825a7174b2fee0dd0f803164bd22ac966e04bdcbe38d4
                                    • Instruction Fuzzy Hash: EF11E9A060020166C704B365DCABDBF765ADB90304F50443FB906E31D2EB6C9E9683EE

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 652 412774-412787 RegCreateKeyW 653 4127c6 652->653 654 412789-4127c4 call 4022f8 call 401e07 RegSetValueExW RegCloseKey 652->654 656 4127c8-4127d4 call 401e13 653->656 654->656
                                    APIs
                                    • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041277F
                                    • RegSetValueExW.KERNELBASE(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004742E0,74DF37E0,?), ref: 004127AD
                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004742E0,74DF37E0,?,?,?,?,?,0040BE18,?,00000000), ref: 004127B8
                                    Strings
                                    • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 0041277D
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateValue
                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                    • API String ID: 1818849710-1051519024
                                    • Opcode ID: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                                    • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                                    • Opcode Fuzzy Hash: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                                    • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 662 40bed7-40bf03 call 401e8f CreateMutexA GetLastError
                                    APIs
                                    • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0040BEE6
                                    • GetLastError.KERNEL32 ref: 0040BEF1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateErrorLastMutex
                                    • String ID: (CG
                                    • API String ID: 1925916568-4210230975
                                    • Opcode ID: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                                    • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                                    • Opcode Fuzzy Hash: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                                    • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 665 412513-41253f RegOpenKeyExA 666 412541-412567 RegQueryValueExA RegCloseKey 665->666 667 412572 665->667 666->667 668 412569-412570 666->668 669 412577-412583 call 401f66 667->669 668->669
                                    APIs
                                    • RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                                    • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                                    • RegCloseKey.KERNELBASE(?), ref: 0041255F
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpenQueryValue
                                    • String ID:
                                    • API String ID: 3677997916-0
                                    • Opcode ID: 1596a47d3a3a9d7b824bf65cdf317066f9d5dabbc4d5e1023ecf94da71e9672a
                                    • Instruction ID: 155fce86b91483c744b9f02885d56de91ccd1cdd8f33956e2d71fd22bd1c87ae
                                    • Opcode Fuzzy Hash: 1596a47d3a3a9d7b824bf65cdf317066f9d5dabbc4d5e1023ecf94da71e9672a
                                    • Instruction Fuzzy Hash: F0F08176900118BBCB209BA1ED48DEF7FBDEB44751F004066BA06E2150D6749E55DBA8

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 672 4124b7-4124df RegOpenKeyExA 673 4124e1-412509 RegQueryValueExA RegCloseKey 672->673 674 41250f-412512 672->674 673->674 675 41250b-41250e 673->675
                                    APIs
                                    • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000), ref: 004124D7
                                    • RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004124F5
                                    • RegCloseKey.ADVAPI32(00000000), ref: 00412500
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpenQueryValue
                                    • String ID:
                                    • API String ID: 3677997916-0
                                    • Opcode ID: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                    • Instruction ID: 3c8b5742b91bab9b7a0bfd6479237677f271592d1db5ef4b45a1d16c6b8d7bbd
                                    • Opcode Fuzzy Hash: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                    • Instruction Fuzzy Hash: C0F03A76900208BFDF119FA0AC45FDF7BB9EB04B55F1040A1FA05F6291D670DA54EB98

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 704 43360d-433610 705 43361f-433622 call 43a88c 704->705 707 433627-43362a 705->707 708 433612-43361d call 442200 707->708 709 43362c-43362d 707->709 708->705 712 43362e-433632 708->712 713 433638-433dec call 433d58 call 437bd7 712->713 714 433ded-433e09 call 433d8b call 437bd7 712->714 713->714
                                    APIs
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00433DE7
                                      • Part of subcall function 00437BD7: RaiseException.KERNEL32(?,?,1DC,?,00475B70,00473D54,00000000,?,?,?,?,00434431,?,0046D680,?), ref: 00437C37
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00433E04
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Exception@8Throw$ExceptionRaise
                                    • String ID:
                                    • API String ID: 3476068407-0
                                    • Opcode ID: 0c813f605dd2a6606fe246f0cee3a0605bca7c2744777b4a7d98c309a0a34cf7
                                    • Instruction ID: 1b32a2814776e74a5aaecdac66354fa275a8f3c838098619b8de34dc4906cb01
                                    • Opcode Fuzzy Hash: 0c813f605dd2a6606fe246f0cee3a0605bca7c2744777b4a7d98c309a0a34cf7
                                    • Instruction Fuzzy Hash: 33F02B30C0020D77CB14BEA5E80699D772C4D08319F20923BB920915E1EF7CEB05858D

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 724 44eeb5-44eec2 call 448706 726 44eec7-44eed2 724->726 727 44eed4-44eed6 726->727 728 44eed8-44eee0 726->728 729 44ef20-44ef2e call 446ac5 727->729 728->729 730 44eee2-44eee6 728->730 732 44eee8-44ef1a call 44772e 730->732 736 44ef1c-44ef1f 732->736 736->729
                                    APIs
                                      • Part of subcall function 00448706: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00446F74,00000001,00000364,?,0043A846,00000000,00000000,00000000,00000000,00000000,00000000,00402C08), ref: 00448747
                                    • _free.LIBCMT ref: 0044EF21
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap_free
                                    • String ID:
                                    • API String ID: 614378929-0
                                    • Opcode ID: 7b4a2f6e9a04df5b0dd70cdaf72135a4707c1be432060349675b23e62071eba1
                                    • Instruction ID: 91765bf56145836b352927287b0900a7be963fc320189fecf9c5ab0789588b10
                                    • Opcode Fuzzy Hash: 7b4a2f6e9a04df5b0dd70cdaf72135a4707c1be432060349675b23e62071eba1
                                    • Instruction Fuzzy Hash: 2D01DB771043056BF321CF66984595AFBD9FB8A370F65051EE59453280EB34A806C778

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 737 448706-448711 738 448713-44871d 737->738 739 44871f-448725 737->739 738->739 740 448753-44875e call 445354 738->740 741 448727-448728 739->741 742 44873e-44874f RtlAllocateHeap 739->742 747 448760-448762 740->747 741->742 743 448751 742->743 744 44872a-448731 call 4447c5 742->744 743->747 744->740 750 448733-44873c call 442200 744->750 750->740 750->742
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00446F74,00000001,00000364,?,0043A846,00000000,00000000,00000000,00000000,00000000,00000000,00402C08), ref: 00448747
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: de2f67f7923a31b36d9b5f834b48d2b0e0f5da7a677d300afd471130a21967f0
                                    • Instruction ID: 09342868e9f2d6cc7f7b696f5049c05c0568eaa44df27644d65b9450949fa691
                                    • Opcode Fuzzy Hash: de2f67f7923a31b36d9b5f834b48d2b0e0f5da7a677d300afd471130a21967f0
                                    • Instruction Fuzzy Hash: 9CF0E93250412467BB216A369D55B5F7748AF427B0B34802BFC08EA691DF68DD4182ED

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 753 446aff-446b0b 754 446b3d-446b48 call 445354 753->754 755 446b0d-446b0f 753->755 763 446b4a-446b4c 754->763 756 446b11-446b12 755->756 757 446b28-446b39 RtlAllocateHeap 755->757 756->757 759 446b14-446b1b call 4447c5 757->759 760 446b3b 757->760 759->754 765 446b1d-446b26 call 442200 759->765 760->763 765->754 765->757
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: dc6ea950822f8571e228d4b4fa6025b1dc9324ca9cf531c4426aa18bd07b2452
                                    • Instruction ID: 23017b4f7b15ec8d1e6c8205d578d5100ba2a3a3bb6c043e3f5ab96588fe2cc9
                                    • Opcode Fuzzy Hash: dc6ea950822f8571e228d4b4fa6025b1dc9324ca9cf531c4426aa18bd07b2452
                                    • Instruction Fuzzy Hash: 16E0E5312002B556FB202A6A9C05F5B7A88DB437A4F160133AC09D62D0CF5CEC4181AF
                                    APIs
                                    • SetEvent.KERNEL32(?,?), ref: 00406F28
                                    • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                                    • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                      • Part of subcall function 0041B42F: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B489
                                      • Part of subcall function 0041B42F: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B4BB
                                      • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B50C
                                      • Part of subcall function 0041B42F: FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B561
                                      • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B568
                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                      • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                      • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                      • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                      • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                      • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                      • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                                    • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                                    • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                                    • DeleteFileA.KERNEL32(?), ref: 004078CC
                                      • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                      • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                      • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                    • Sleep.KERNEL32(000007D0), ref: 00407976
                                    • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                      • Part of subcall function 0041BB77: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                                    • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $H@G$Unable to delete: $Unable to rename file!$V>G$open$x@G$x@G$x@G$x@G$>G
                                    • API String ID: 2918587301-599666313
                                    • Opcode ID: 150e374efa64d593e4a7e0c513c575a5e923c9d1cdd3a2561e68d1d307a0062f
                                    • Instruction ID: 8a4068a2e00c67808ff4e441dc576a613f01372a1abbdcb91e63f440e0dcd641
                                    • Opcode Fuzzy Hash: 150e374efa64d593e4a7e0c513c575a5e923c9d1cdd3a2561e68d1d307a0062f
                                    • Instruction Fuzzy Hash: 60429371A043005BC614F776C8979AE77A99F90718F40493FF946731E2EE3CAA09C69B
                                    APIs
                                    • __Init_thread_footer.LIBCMT ref: 0040508E
                                      • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                      • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                    • __Init_thread_footer.LIBCMT ref: 004050CB
                                    • CreatePipe.KERNEL32(00475CEC,00475CD4,00475BF8,00000000,0046556C,00000000), ref: 0040515E
                                    • CreatePipe.KERNEL32(00475CD8,00475CF4,00475BF8,00000000), ref: 00405174
                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C08,00475CDC), ref: 004051E7
                                      • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                      • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                                    • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                                    • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                                    • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                      • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                    • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                                    • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                                    • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                                    • CloseHandle.KERNEL32 ref: 004053CD
                                    • CloseHandle.KERNEL32 ref: 004053D5
                                    • CloseHandle.KERNEL32 ref: 004053E7
                                    • CloseHandle.KERNEL32 ref: 004053EF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                    • String ID: P\G$P\G$P\G$P\G$P\G$SystemDrive$cmd.exe
                                    • API String ID: 3815868655-81343324
                                    • Opcode ID: bfcb8ec680749e1ff3d96b83f6722c7489f5814a8e376730b38478a1694e7e9c
                                    • Instruction ID: b18bac6d60c4c725a58799f80733fb47b3e4e6a61b1262bf76379e9ec18ff918
                                    • Opcode Fuzzy Hash: bfcb8ec680749e1ff3d96b83f6722c7489f5814a8e376730b38478a1694e7e9c
                                    • Instruction Fuzzy Hash: A691E5716007056FD705BB65AC41A6F37A8EB80348F50403FF94ABA1E2EEBC9C448B6D
                                    APIs
                                    • GetCurrentProcessId.KERNEL32 ref: 00410F45
                                      • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                      • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                      • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                    • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410F81
                                    • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 00410FE6
                                      • Part of subcall function 004124B7: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000), ref: 004124D7
                                      • Part of subcall function 004124B7: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004124F5
                                      • Part of subcall function 004124B7: RegCloseKey.ADVAPI32(00000000), ref: 00412500
                                    • CloseHandle.KERNEL32(00000000), ref: 00410F90
                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                    • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041125A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                    • String ID: 0DG$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$BG
                                    • API String ID: 65172268-860466531
                                    • Opcode ID: 5a81626a4609f3178aed30ff3a92a065a3326e2b32edd8bbe01bcb9fad261df8
                                    • Instruction ID: 2ec41641ff7d981187ed77e29e7d519fc89a207972baa733902a05010441332b
                                    • Opcode Fuzzy Hash: 5a81626a4609f3178aed30ff3a92a065a3326e2b32edd8bbe01bcb9fad261df8
                                    • Instruction Fuzzy Hash: 97719E3160420157C614FB32D8579AE77A8AED4718F40053FF582A21F2EF7CAA49869F
                                    APIs
                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                                    • FindClose.KERNEL32(00000000), ref: 0040B3CE
                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                                    • FindClose.KERNEL32(00000000), ref: 0040B517
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$CloseFile$FirstNext
                                    • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                    • API String ID: 1164774033-3681987949
                                    • Opcode ID: 012abd7bd482f24294ec220c5f3416e7c12077f4aefc2c6d47742caa5bc96ad8
                                    • Instruction ID: 89bba1744b34cafda07904381260291e44814ca984bf7dbd554ee600cd7873bd
                                    • Opcode Fuzzy Hash: 012abd7bd482f24294ec220c5f3416e7c12077f4aefc2c6d47742caa5bc96ad8
                                    • Instruction Fuzzy Hash: 4D512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                                    APIs
                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                                    • FindClose.KERNEL32(00000000), ref: 0040B5CC
                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                                    • FindClose.KERNEL32(00000000), ref: 0040B6B2
                                    • FindClose.KERNEL32(00000000), ref: 0040B6D1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$Close$File$FirstNext
                                    • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                    • API String ID: 3527384056-432212279
                                    • Opcode ID: eec28e5122cf95747afd0231d26089d1190572cbd646818cfb2ab67d48c7021b
                                    • Instruction ID: 41d59f58487c11b5b23c2ebc8e3123b77d6604a8f5f59a85184e8f88ff1ca84c
                                    • Opcode Fuzzy Hash: eec28e5122cf95747afd0231d26089d1190572cbd646818cfb2ab67d48c7021b
                                    • Instruction Fuzzy Hash: 65413A319042196ACB14F7A1EC569EE7768EE21318F50017FF801B31E2EF399A458A9E
                                    APIs
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                                    • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                                      • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                      • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                      • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                    • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                    • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$BG
                                    • API String ID: 726551946-3025026198
                                    • Opcode ID: 2298112d5e9beca4c64cadb89c7e546d0899f31810f4b1b50fdabc55d78eae7e
                                    • Instruction ID: ae31f71cb8b9f969ca9e83e5ca698076ed3bac053ed440982de07d1dc4d90588
                                    • Opcode Fuzzy Hash: 2298112d5e9beca4c64cadb89c7e546d0899f31810f4b1b50fdabc55d78eae7e
                                    • Instruction Fuzzy Hash: ED7172311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A959CA9A
                                    APIs
                                    • OpenClipboard.USER32 ref: 004159C7
                                    • EmptyClipboard.USER32 ref: 004159D5
                                    • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004159F5
                                    • GlobalLock.KERNEL32(00000000), ref: 004159FE
                                    • GlobalUnlock.KERNEL32(00000000), ref: 00415A34
                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00415A3D
                                    • CloseClipboard.USER32 ref: 00415A5A
                                    • OpenClipboard.USER32 ref: 00415A61
                                    • GetClipboardData.USER32(0000000D), ref: 00415A71
                                    • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                    • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                    • CloseClipboard.USER32 ref: 00415A89
                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                    • String ID:
                                    • API String ID: 3520204547-0
                                    • Opcode ID: 5bf6c0a188ebc9cd77caef7c6d8a55023eea9b799c8747cd0bf31199529283f8
                                    • Instruction ID: b8e523df9fc7c7245f85f50a48877f09888e29e8b5459684195c928b546a98bf
                                    • Opcode Fuzzy Hash: 5bf6c0a188ebc9cd77caef7c6d8a55023eea9b799c8747cd0bf31199529283f8
                                    • Instruction Fuzzy Hash: E02183712043009BC714BBB1EC5AAAE76A9AF80752F00453EFD06961E2EF38C845D66A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: 0$1$2$3$4$5$6$7
                                    • API String ID: 0-3177665633
                                    • Opcode ID: cde1b3d257b3b84ac0aca3a867a652d949c29c2e455d7912b36e5a4a136b74f3
                                    • Instruction ID: 2879f211a781d1662389055333b9a248a4bc7621c6500268a6892da51c348380
                                    • Opcode Fuzzy Hash: cde1b3d257b3b84ac0aca3a867a652d949c29c2e455d7912b36e5a4a136b74f3
                                    • Instruction Fuzzy Hash: CC61A370508301AEDB00EF21D862FEA77E4AF85754F40485EFA91672E1DF789A48C797
                                    APIs
                                    • GetForegroundWindow.USER32 ref: 00409B3F
                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                    • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                    • GetKeyState.USER32(00000010), ref: 00409B5C
                                    • GetKeyboardState.USER32(?), ref: 00409B67
                                    • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                    • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                    • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                    • String ID: 8[G
                                    • API String ID: 1888522110-1691237782
                                    • Opcode ID: 0057a6b8e9be89c2a124ace2c7aa15ce6e2280d77a8450e2501583d43799386c
                                    • Instruction ID: f24a8317de74a0bbad47f265c67a45df51816e9018bfad09e00086f3728f1c27
                                    • Opcode Fuzzy Hash: 0057a6b8e9be89c2a124ace2c7aa15ce6e2280d77a8450e2501583d43799386c
                                    • Instruction Fuzzy Hash: EE318172508309AFD700DF90DC85FDBB7ECEB48715F00083ABA45961A1D6B5E948DB96
                                    APIs
                                    • _wcslen.LIBCMT ref: 00406788
                                    • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Object_wcslen
                                    • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                    • API String ID: 240030777-3166923314
                                    • Opcode ID: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                                    • Instruction ID: dba8c49f7cecafb8ed31af17d29d910bb03d3c12ecd117c8e18c4d6c9c114880
                                    • Opcode Fuzzy Hash: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                                    • Instruction Fuzzy Hash: 811170B2901118AEDB10FAA5884AA9EB7BCDB48714F55007FE905F3281E7789A148A7D
                                    APIs
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004748F8), ref: 004198D8
                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419927
                                    • GetLastError.KERNEL32 ref: 00419935
                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041996D
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                    • String ID:
                                    • API String ID: 3587775597-0
                                    • Opcode ID: 46cfc2a1174990e4b59b9ee5729c715e61cf9958b22909a5f2789daa8df81af0
                                    • Instruction ID: 5304d2aa3016a1bb8b693e548c532b43deb082133906afc562c92feca393f19d
                                    • Opcode Fuzzy Hash: 46cfc2a1174990e4b59b9ee5729c715e61cf9958b22909a5f2789daa8df81af0
                                    • Instruction Fuzzy Hash: 37812F711083049BC614FB21DC959AFB7A8BF94718F50493EF582521E2EF78AA05CB9A
                                    APIs
                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B489
                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B4BB
                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B529
                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B536
                                      • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B50C
                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B561
                                    • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B568
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00473EE8,00000000), ref: 0041B570
                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B583
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                    • String ID:
                                    • API String ID: 2341273852-0
                                    • Opcode ID: 38605e05b284b3287545d71b9912fe11a1e5e192bb535f2a18b99cb8ec032d5d
                                    • Instruction ID: e81c2b0307560c21eb772b723951cbad4d8c7a866ea933437d0d5d39764c0eb1
                                    • Opcode Fuzzy Hash: 38605e05b284b3287545d71b9912fe11a1e5e192bb535f2a18b99cb8ec032d5d
                                    • Instruction Fuzzy Hash: 0031627184921CAACB20D7B1AC89ADA77BCAF04309F4405EBF505D3181EB799AC5CE69
                                    APIs
                                    • FindFirstFileW.KERNEL32(00000000,?), ref: 00418EBF
                                    • FindNextFileW.KERNEL32(00000000,?,?), ref: 00418F8B
                                      • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Find$CreateFirstNext
                                    • String ID: @CG$XCG$`HG$`HG$>G
                                    • API String ID: 341183262-3780268858
                                    • Opcode ID: c7ab7af1c0f5eed08ada90e0087c4ff74bdb9080a69c09e479a4fb32dedf6aac
                                    • Instruction ID: 861c71bda04042c44626cba1538e35c757a91b728f0af2478fb4c1063bb13cc5
                                    • Opcode Fuzzy Hash: c7ab7af1c0f5eed08ada90e0087c4ff74bdb9080a69c09e479a4fb32dedf6aac
                                    • Instruction Fuzzy Hash: B08141315042405BC314FB62C892EEFB3A5AFD1718F50493FF946671E2EF389A49C69A
                                    APIs
                                    • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                                    • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                                    • GetLastError.KERNEL32 ref: 00409A1B
                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                                    • TranslateMessage.USER32(?), ref: 00409A7A
                                    • DispatchMessageA.USER32(?), ref: 00409A85
                                    Strings
                                    • Keylogger initialization failure: error , xrefs: 00409A32
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                    • String ID: Keylogger initialization failure: error
                                    • API String ID: 3219506041-952744263
                                    • Opcode ID: 10065da0f80e2b1588f186909b8751ab17816e81d90ef01b858d99eb9022e310
                                    • Instruction ID: 76b292cdb4e6355f9a4176d1f10d626d2d11be3de55f9aee7ae49bf60faff0c2
                                    • Opcode Fuzzy Hash: 10065da0f80e2b1588f186909b8751ab17816e81d90ef01b858d99eb9022e310
                                    • Instruction Fuzzy Hash: 201194716043015BC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAB
                                    APIs
                                    • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 0041301A
                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 00413026
                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                    • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004131ED
                                    • GetProcAddress.KERNEL32(00000000), ref: 004131F4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressCloseCreateLibraryLoadProcsend
                                    • String ID: SHDeleteKeyW$Shlwapi.dll
                                    • API String ID: 2127411465-314212984
                                    • Opcode ID: b09782354cd857db685d2d11ab1c16eab5c507a6b5bd3660932a5bc204f1336e
                                    • Instruction ID: cc67afc49b78d61a2372e1362dfc4f5d4a672f2d1b5b468e2109e7b1f18a6fb5
                                    • Opcode Fuzzy Hash: b09782354cd857db685d2d11ab1c16eab5c507a6b5bd3660932a5bc204f1336e
                                    • Instruction Fuzzy Hash: 4FB1B671A043006BC614BA76CC979BE76989F94718F40063FF946B31E2EF7C9A4486DB
                                    APIs
                                      • Part of subcall function 004124B7: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000), ref: 004124D7
                                      • Part of subcall function 004124B7: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004124F5
                                      • Part of subcall function 004124B7: RegCloseKey.ADVAPI32(00000000), ref: 00412500
                                    • Sleep.KERNEL32(00000BB8), ref: 0040E603
                                    • ExitProcess.KERNEL32 ref: 0040E672
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseExitOpenProcessQuerySleepValue
                                    • String ID: 5.3.0 Pro$override$pth_unenc$BG
                                    • API String ID: 2281282204-3981147832
                                    • Opcode ID: e7420bd81adcf7ecaeb63c441a7eb2a496d40f418d65372005f5d4e07d0bafb2
                                    • Instruction ID: 346becae97c590b24629de205d3f766cc2ad037e5fc603921d36f10068cff0f4
                                    • Opcode Fuzzy Hash: e7420bd81adcf7ecaeb63c441a7eb2a496d40f418d65372005f5d4e07d0bafb2
                                    • Instruction Fuzzy Hash: 6B21A131B0030027C608767A891BA6F359A9B91719F90443EF805A76D7EE7D8A6083DF
                                    APIs
                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                                    • GetLastError.KERNEL32 ref: 0040B261
                                    Strings
                                    • UserProfile, xrefs: 0040B227
                                    • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                                    • [Chrome StoredLogins not found], xrefs: 0040B27B
                                    • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DeleteErrorFileLast
                                    • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                    • API String ID: 2018770650-1062637481
                                    • Opcode ID: b5e309dbdaf0aeabe7af2cd1639cb477138ee585283f82b93ad88acdd4edf375
                                    • Instruction ID: 236ee74dc97b4bdf00ef4875347123a6b81b21ae8e03a402b83ae8c28ff1bd46
                                    • Opcode Fuzzy Hash: b5e309dbdaf0aeabe7af2cd1639cb477138ee585283f82b93ad88acdd4edf375
                                    • Instruction Fuzzy Hash: 3001A23168410597CA0477B5ED6F8AE3624E921704F50017FF802731E2FF3A9A0586DE
                                    APIs
                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                    • GetLastError.KERNEL32 ref: 00416B02
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                    • String ID: SeShutdownPrivilege
                                    • API String ID: 3534403312-3733053543
                                    • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                    • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                                    • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                    • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                                    APIs
                                    • __EH_prolog.LIBCMT ref: 004089AE
                                      • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                      • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                                    • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                      • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                      • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                      • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,00475B70,?,?,00000000,00475B70,004017F3), ref: 004047FD
                                      • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404808
                                      • Part of subcall function 004047EB: CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404811
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                                    • String ID:
                                    • API String ID: 4043647387-0
                                    • Opcode ID: 09a69e0303e81d48d1e7444200da9c76687e86ed7c9a89389c8c98f32268c2c3
                                    • Instruction ID: d7705bc86650fd6632c5f082d335fbcd32bd3fe840799e2454ee74f5ab9ae988
                                    • Opcode Fuzzy Hash: 09a69e0303e81d48d1e7444200da9c76687e86ed7c9a89389c8c98f32268c2c3
                                    • Instruction Fuzzy Hash: 11A15C729001089ACB14EBA1DD92AEDB778AF54318F10427FF546B71D2EF385E498B98
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041981A,00000000,00000000), ref: 00419BCD
                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041981A,00000000,00000000), ref: 00419BE2
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419BEF
                                    • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041981A,00000000,00000000), ref: 00419BFA
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0C
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0F
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$Open$ManagerStart
                                    • String ID:
                                    • API String ID: 276877138-0
                                    • Opcode ID: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                                    • Instruction ID: 9ab78235182221d9a13884b701025ebbd4d22640777282bd149d85cf0e5c5631
                                    • Opcode Fuzzy Hash: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                                    • Instruction Fuzzy Hash: 46F0E971404314AFD2115B31FC88DBF2AACEF85BA2B00043AF54193191CF68CD4595B9
                                    APIs
                                      • Part of subcall function 00416AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                      • Part of subcall function 00416AB7: OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                      • Part of subcall function 00416AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                      • Part of subcall function 00416AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                      • Part of subcall function 00416AB7: GetLastError.KERNEL32 ref: 00416B02
                                    • ExitWindowsEx.USER32(00000000,00000001), ref: 0041595B
                                    • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415970
                                    • GetProcAddress.KERNEL32(00000000), ref: 00415977
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                    • String ID: PowrProf.dll$SetSuspendState
                                    • API String ID: 1589313981-1420736420
                                    • Opcode ID: dbe2315887bba6ce4f894fc1155da3ca588fd34dbc6ce905beef225a72b0054e
                                    • Instruction ID: 94bd0be5b4d635cf3270abd21b93e0cba208aed3fdadf5553bbce7524c8ebf13
                                    • Opcode Fuzzy Hash: dbe2315887bba6ce4f894fc1155da3ca588fd34dbc6ce905beef225a72b0054e
                                    • Instruction Fuzzy Hash: 7D2150B0604741E6CA14F7B19856AEF225A9F80748F40883FB402A72D2EF7CDC89865E
                                    APIs
                                    • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 0045127C
                                    • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 004512A5
                                    • GetACP.KERNEL32 ref: 004512BA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoLocale
                                    • String ID: ACP$OCP
                                    • API String ID: 2299586839-711371036
                                    • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                    • Instruction ID: bcb6c1b5649eca6e102b6d6ca9fa22aa61ab34f591545d84575f60c76f210f03
                                    • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                    • Instruction Fuzzy Hash: 50212722600100A6D7348F54D900BAB73A6AB40B66F1645E6FD09E7322F736DD49C799
                                    APIs
                                    • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A650
                                    • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A664
                                    • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A66B
                                    • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Resource$FindLoadLockSizeof
                                    • String ID: SETTINGS
                                    • API String ID: 3473537107-594951305
                                    • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                    • Instruction ID: 83a829ee02157d331b98a48cb758db5ec39b6d120b3a3db205f860a33549a403
                                    • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                    • Instruction Fuzzy Hash: 3EE01A3A200710ABCB211BA5BC8CD477E39E7867633140036F90582331DA358850CA59
                                    APIs
                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                    • GetUserDefaultLCID.KERNEL32 ref: 004514C3
                                    • IsValidCodePage.KERNEL32(00000000), ref: 0045151E
                                    • IsValidLocale.KERNEL32(?,00000001), ref: 0045152D
                                    • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00451575
                                    • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 00451594
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                    • String ID:
                                    • API String ID: 745075371-0
                                    • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                    • Instruction ID: fdda48fcf8ef828b158f806230e01f9d82b9b72a6df542884d0e4dc3e0683d2c
                                    • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                    • Instruction Fuzzy Hash: 5A51D571900205ABEF10EFA5CC40BBF73B8AF05702F14056BFD11EB262E7789A488769
                                    APIs
                                    • __EH_prolog.LIBCMT ref: 00407A91
                                    • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$File$CloseFirstH_prologNext
                                    • String ID:
                                    • API String ID: 1157919129-0
                                    • Opcode ID: be329e02f9a977489ec03ab4a587285a9e8b683dbacd723bef2334c22b0cd63e
                                    • Instruction ID: c296e4c637b16ec180f1d25cf2666c4e6f2336455dd814d501b84ef2841b6e91
                                    • Opcode Fuzzy Hash: be329e02f9a977489ec03ab4a587285a9e8b683dbacd723bef2334c22b0cd63e
                                    • Instruction Fuzzy Hash: 485173329041085ACB14FB65DD969DD7778AF50318F50417EB806B31E2EF38AB498B99
                                    APIs
                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                                    • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DownloadExecuteFileShell
                                    • String ID: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe$open
                                    • API String ID: 2825088817-4019878541
                                    • Opcode ID: 5adff465ff0e5c6f3c124b44dbfa886a055acdc78a66fe405cab157b341b5a3e
                                    • Instruction ID: f68f5450864a8ef507c8d3860f756bd811b48be2db930e76b40a644c5c1bb7bc
                                    • Opcode Fuzzy Hash: 5adff465ff0e5c6f3c124b44dbfa886a055acdc78a66fe405cab157b341b5a3e
                                    • Instruction Fuzzy Hash: 0761A33160434067CA14FA76C8569BE77A69F81718F00493FBC46772D6EF3C9A05C69B
                                    APIs
                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                                    • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileFind$FirstNextsend
                                    • String ID: x@G$x@G
                                    • API String ID: 4113138495-3390264752
                                    • Opcode ID: be8fdfc8a6072efbca1459ab7643d284853c2ddcf9d8b62b0637e10f69e8db4b
                                    • Instruction ID: 9df0c8526107c53e8273efc1e688d8f669138e67c86485f4ac558c26d22f9560
                                    • Opcode Fuzzy Hash: be8fdfc8a6072efbca1459ab7643d284853c2ddcf9d8b62b0637e10f69e8db4b
                                    • Instruction Fuzzy Hash: B42147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                                    APIs
                                    • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                      • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                                      • Part of subcall function 004126D2: RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                                      • Part of subcall function 004126D2: RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateInfoParametersSystemValue
                                    • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                    • API String ID: 4127273184-3576401099
                                    • Opcode ID: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                                    • Instruction ID: a6c166168c7895b99543370299e99232025f4d6daba66cbb636fef562e17b9dc
                                    • Opcode Fuzzy Hash: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                                    • Instruction Fuzzy Hash: 06112432B8060433D514303A4E6FBAE1806D356B60FA4415FF6026A6DAFA9E5AE103DF
                                    APIs
                                    • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                      • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                                      • Part of subcall function 004126D2: RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                                      • Part of subcall function 004126D2: RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateInfoParametersSystemValue
                                    • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                    • API String ID: 4127273184-3576401099
                                    • Opcode ID: 71d1e5c445f68871914c285a29d0046b246b6ade461d972b8fac6679235b0182
                                    • Instruction ID: f2617a255fd7246e173cf48333a5ec3092ca3a632a8680fa2b2f8bd5747a896b
                                    • Opcode Fuzzy Hash: 71d1e5c445f68871914c285a29d0046b246b6ade461d972b8fac6679235b0182
                                    • Instruction Fuzzy Hash: 9EF0623278011422D529357A8E2FBEE1801D796B20F65402FF202A57D6FB8E46D142DE
                                    APIs
                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                    • IsValidCodePage.KERNEL32(00000000), ref: 00450B61
                                    • _wcschr.LIBVCRUNTIME ref: 00450BF1
                                    • _wcschr.LIBVCRUNTIME ref: 00450BFF
                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00450CA2
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                    • String ID:
                                    • API String ID: 4212172061-0
                                    • Opcode ID: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                                    • Instruction ID: a02e79dc60b90d06ce6287b0e519d5a2a37574338541b46fb9e412c2f7ec0900
                                    • Opcode Fuzzy Hash: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                                    • Instruction Fuzzy Hash: D7613B79600306AAD729AB75CC82AAB73ACEF05316F14052FFD05D7243E778E909C768
                                    APIs
                                    • __EH_prolog.LIBCMT ref: 00408DAC
                                    • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileFind$FirstH_prologNext
                                    • String ID:
                                    • API String ID: 301083792-0
                                    • Opcode ID: 0245cb435e7972fa9dc1819fe4f867f76e5734f3076513a46e64ed25397209d2
                                    • Instruction ID: 60446431aa0b45b5fc099c057f6d50f3e7887136e12703af2d86415be67689ac
                                    • Opcode Fuzzy Hash: 0245cb435e7972fa9dc1819fe4f867f76e5734f3076513a46e64ed25397209d2
                                    • Instruction Fuzzy Hash: 357140328001099BCB15EBA1DC919EE7778AF54318F10427FE856B71E2EF386E45CB98
                                    APIs
                                    • _free.LIBCMT ref: 00448067
                                      • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                      • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                    • GetTimeZoneInformation.KERNEL32 ref: 00448079
                                    • WideCharToMultiByte.KERNEL32(00000000,?,0047179C,000000FF,?,0000003F,?,?), ref: 004480F1
                                    • WideCharToMultiByte.KERNEL32(00000000,?,004717F0,000000FF,?,0000003F,?,?,?,0047179C,000000FF,?,0000003F,?,?), ref: 0044811E
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                    • String ID:
                                    • API String ID: 806657224-0
                                    • Opcode ID: 5e34e117c6e33b8c0844c195e2b7af46f687c91a19e7202acb7e93967a2f0af9
                                    • Instruction ID: ab6739d36243922ba69d1bbe12a1b6ae93f84769bc63f42ae41568d8b76a7737
                                    • Opcode Fuzzy Hash: 5e34e117c6e33b8c0844c195e2b7af46f687c91a19e7202acb7e93967a2f0af9
                                    • Instruction Fuzzy Hash: 8731DA70904205DFEB149F68CC8186EBBF8FF05760B2442AFE054AB2A1DB349A42DB18
                                    APIs
                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450EBE
                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450F0F
                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450FCF
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorInfoLastLocale$_free$_abort
                                    • String ID:
                                    • API String ID: 2829624132-0
                                    • Opcode ID: 0004d795c3ddcb7d717e2e5c50f1122ee861edcca01c339632c8702d630a2b0e
                                    • Instruction ID: e92eb603d23812efeda5bde14236c6fbce748c008cf001f3fb8de25b7fcb8669
                                    • Opcode Fuzzy Hash: 0004d795c3ddcb7d717e2e5c50f1122ee861edcca01c339632c8702d630a2b0e
                                    • Instruction Fuzzy Hash: AC61D3365002079FDB289F24CD82BBB77A8EF04706F1041BBED05C6696E778D989DB58
                                    APIs
                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0043A755
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0043A75F
                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0043A76C
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                    • String ID:
                                    • API String ID: 3906539128-0
                                    • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                    • Instruction ID: 15fc2c217458336097e8e19d69e2940e7c5a4b77666d4e23b7e272f62fea865b
                                    • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                    • Instruction Fuzzy Hash: 2D31D47490121CABCB21DF64D98979DBBB8BF08310F5052EAE81CA7251E7349F81CF49
                                    APIs
                                    • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326C2,00000024,?,?,?), ref: 0043294C
                                    • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBBE,?), ref: 00432962
                                    • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBBE,?), ref: 00432974
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Crypt$Context$AcquireRandomRelease
                                    • String ID:
                                    • API String ID: 1815803762-0
                                    • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                    • Instruction ID: 80435fde6f6b62f03973a002229794bf261f16e8857de4c024377aa862d1bdf3
                                    • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                    • Instruction Fuzzy Hash: 11E06D31308211BBEB310E25BC08F573F94AF89B71F71053AB211E40E4C2A188419A1C
                                    APIs
                                    • GetCurrentProcess.KERNEL32(?,?,0044252A,?), ref: 00442575
                                    • TerminateProcess.KERNEL32(00000000,?,0044252A,?), ref: 0044257C
                                    • ExitProcess.KERNEL32 ref: 0044258E
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CurrentExitTerminate
                                    • String ID:
                                    • API String ID: 1703294689-0
                                    • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                    • Instruction ID: 6e58600c80f72e94ca833af3256d2da28fe7ef7edb4b61bff2e48710a34f1207
                                    • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                    • Instruction Fuzzy Hash: 65E08C31004648BFDF016F14EE18A893F29EF10346F408475F80A8A632CFB9DE92CB88
                                    APIs
                                    • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475EA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoLocale
                                    • String ID: GetLocaleInfoEx
                                    • API String ID: 2299586839-2904428671
                                    • Opcode ID: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                    • Instruction ID: 80a81796b135a3e0eaabc3ca7fb48afb6b687e063e78a0117ef0368584b3b56e
                                    • Opcode Fuzzy Hash: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                    • Instruction Fuzzy Hash: 82F0F031A44308BBDB11AF61EC06F6E7B25EF04712F00416AFC046A2A2CB359E11969E
                                    APIs
                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045110E
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$_free$InfoLocale_abort
                                    • String ID:
                                    • API String ID: 1663032902-0
                                    • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                    • Instruction ID: 725ff80feb3504da526bb6f16fdbe645276de1ecdd37ac2f1e7666d8a95350e0
                                    • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                    • Instruction Fuzzy Hash: 2D21B332500606ABDB249A25DC46B7B73A8EB09316F1041BBFE01C6252EB79DD48CB99
                                    APIs
                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                    • EnumSystemLocalesW.KERNEL32(00450E6A,00000001), ref: 00450DB4
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                    • String ID:
                                    • API String ID: 1084509184-0
                                    • Opcode ID: 9d28c5e255c7ff7bf8c29f4c99fb410e4ec57aee4c7c61eda1ee1a9008b30fc6
                                    • Instruction ID: b1cdb4a87285138648e71eec5b58018a028c0508cbf90fbfa4a5e64eba390ba2
                                    • Opcode Fuzzy Hash: 9d28c5e255c7ff7bf8c29f4c99fb410e4ec57aee4c7c61eda1ee1a9008b30fc6
                                    • Instruction Fuzzy Hash: 9C11293B2007055FDB189F79D8916BAB7A1FF8031AB14442DE94647741D375B846C744
                                    APIs
                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451088,00000000,00000000,?), ref: 00451316
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$InfoLocale_abort_free
                                    • String ID:
                                    • API String ID: 2692324296-0
                                    • Opcode ID: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                                    • Instruction ID: 964a9937ac5a020d26487979adcc3deadbef587b10f76395f6381cc8137ce6dd
                                    • Opcode Fuzzy Hash: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                                    • Instruction Fuzzy Hash: 10F07D32500111BBEB286A25CC16BFF7758EB00716F15046BEC06A3651FA38FD49C6D4
                                    APIs
                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                    • EnumSystemLocalesW.KERNEL32(004510BA,00000001), ref: 00450E29
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                    • String ID:
                                    • API String ID: 1084509184-0
                                    • Opcode ID: 39b6845edf5822fb0cb5ec1b15846e624abd352d664abc6135ad0e1aa048f885
                                    • Instruction ID: d323619e2976bd52c5edaa4f55efd93dda7e8b303aa23e489220a9c0c916f3e4
                                    • Opcode Fuzzy Hash: 39b6845edf5822fb0cb5ec1b15846e624abd352d664abc6135ad0e1aa048f885
                                    • Instruction Fuzzy Hash: 5BF0223A2003045FDB145F3AD882AAB7B95EF81729B25842EFD058B782D275AC42C644
                                    APIs
                                    • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7D7
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: NameUser
                                    • String ID:
                                    • API String ID: 2645101109-0
                                    • Opcode ID: b83c9b6e74ee29b4b3c5d203829dc1b50a3012795622bded812fc81b4dbbb1d6
                                    • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                                    • Opcode Fuzzy Hash: b83c9b6e74ee29b4b3c5d203829dc1b50a3012795622bded812fc81b4dbbb1d6
                                    • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98
                                    APIs
                                      • Part of subcall function 00444ACC: EnterCriticalSection.KERNEL32(?,?,0044225B,00000000,0046DAC0,0000000C,00442216,?,?,?,00448739,?,?,00446F74,00000001,00000364), ref: 00444ADB
                                    • EnumSystemLocalesW.KERNEL32(Function_00047068,00000001,0046DC48,0000000C), ref: 004470E6
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                    • String ID:
                                    • API String ID: 1272433827-0
                                    • Opcode ID: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                    • Instruction ID: 877f7ae5c491a2fbf36f534f7b8138893028b6a81f24f5c3744eb9f6a7677366
                                    • Opcode Fuzzy Hash: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                    • Instruction Fuzzy Hash: F6F04932A10200EFEB04EF68E806B4D77B0EB44725F10816AF414DB2E2DB7889818B49
                                    APIs
                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                    • EnumSystemLocalesW.KERNEL32(00450C4E,00000001), ref: 00450D2E
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                    • String ID:
                                    • API String ID: 1084509184-0
                                    • Opcode ID: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                    • Instruction ID: ec648f77c102ae861fabd43d141f98194b25f4d0b1f390d0839222eb7000fb0b
                                    • Opcode Fuzzy Hash: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                    • Instruction Fuzzy Hash: CBF05C3D30020557CB159F35D81576B7F94EFC2711B07405AFE098B381C239D846C754
                                    APIs
                                    • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A10,00473EE8,00000000,00473EE8,?,00473EE8,5.3.0 Pro), ref: 0040E68D
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoLocale
                                    • String ID:
                                    • API String ID: 2299586839-0
                                    • Opcode ID: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                                    • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                                    • Opcode Fuzzy Hash: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                                    • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: recv
                                    • String ID:
                                    • API String ID: 1507349165-0
                                    • Opcode ID: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                    • Instruction ID: fbcf0fb35859d26dd0bec2a34c6193cd90ff2e5205aa97c5c9b80f8ed11fde70
                                    • Opcode Fuzzy Hash: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                    • Instruction Fuzzy Hash: 35B09279118202FFCA051B60DC0887ABEBAABCC381F108D2DB586501B0CA37C451AB26
                                    APIs
                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00033CE3,004339B1), ref: 00433CDC
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled
                                    • String ID:
                                    • API String ID: 3192549508-0
                                    • Opcode ID: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                    • Instruction ID: 83953e3dca8a62111c248ad4478ddd9c1373f985a30770e5fc8846644fe13ce9
                                    • Opcode Fuzzy Hash: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                    • Instruction Fuzzy Hash:
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: HeapProcess
                                    • String ID:
                                    • API String ID: 54951025-0
                                    • Opcode ID: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                    • Instruction ID: 9504a653bcf427532d5064532c05f1d04939bb5561e35e6535c2a7eba45b7a60
                                    • Opcode Fuzzy Hash: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                    • Instruction Fuzzy Hash: 84A00270506201CB57404F756F0525937D9654559170580755409C5571D62585905615
                                    APIs
                                    • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00417FB9
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00417FC4
                                      • Part of subcall function 00418452: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418482
                                    • CreateCompatibleBitmap.GDI32(?,00000000), ref: 00418045
                                    • DeleteDC.GDI32(?), ref: 0041805D
                                    • DeleteDC.GDI32(00000000), ref: 00418060
                                    • SelectObject.GDI32(00000000,00000000), ref: 0041806B
                                    • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 00418093
                                    • GetIconInfo.USER32(?,?), ref: 004180CB
                                    • DeleteObject.GDI32(?), ref: 004180FA
                                    • DeleteObject.GDI32(?), ref: 00418107
                                    • DrawIcon.USER32(00000000,?,?,?), ref: 00418114
                                    • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00660046), ref: 00418144
                                    • GetObjectA.GDI32(?,00000018,?), ref: 00418173
                                    • LocalAlloc.KERNEL32(00000040,00000028), ref: 004181BC
                                    • LocalAlloc.KERNEL32(00000040,00000001), ref: 004181DF
                                    • GlobalAlloc.KERNEL32(00000000,?), ref: 00418248
                                    • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041826B
                                    • DeleteDC.GDI32(?), ref: 0041827F
                                    • DeleteDC.GDI32(00000000), ref: 00418282
                                    • DeleteObject.GDI32(00000000), ref: 00418285
                                    • GlobalFree.KERNEL32(00CC0020), ref: 00418290
                                    • DeleteObject.GDI32(00000000), ref: 00418344
                                    • GlobalFree.KERNEL32(?), ref: 0041834B
                                    • DeleteDC.GDI32(?), ref: 0041835B
                                    • DeleteDC.GDI32(00000000), ref: 00418366
                                    • DeleteDC.GDI32(?), ref: 00418398
                                    • DeleteDC.GDI32(00000000), ref: 0041839B
                                    • DeleteObject.GDI32(?), ref: 004183A1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconLocal$BitmapBitsDisplayDrawEnumInfoSelectSettingsStretch
                                    • String ID: DISPLAY
                                    • API String ID: 1765752176-865373369
                                    • Opcode ID: 86e38cefe18f60a5317b990390b8ef0f53fe4f457a10542f643d98f04a2d82c8
                                    • Instruction ID: f05cd178694609e891ba83f5bdf02bb76ea447df34f4969275af8919d08089d1
                                    • Opcode Fuzzy Hash: 86e38cefe18f60a5317b990390b8ef0f53fe4f457a10542f643d98f04a2d82c8
                                    • Instruction Fuzzy Hash: 12C17C31508345AFD3209F25DC44BABBBE9FF88751F04082EF989932A1DB34E945CB5A
                                    APIs
                                    • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0041728C
                                    • GetProcAddress.KERNEL32(00000000), ref: 0041728F
                                    • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 004172A0
                                    • GetProcAddress.KERNEL32(00000000), ref: 004172A3
                                    • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 004172B4
                                    • GetProcAddress.KERNEL32(00000000), ref: 004172B7
                                    • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004172C8
                                    • GetProcAddress.KERNEL32(00000000), ref: 004172CB
                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                                    • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                                    • GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                                    • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417440
                                    • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                                    • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                                    • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                                    • SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                                    • ResumeThread.KERNEL32(?), ref: 00417582
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                                    • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                                    • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                                    • GetLastError.KERNEL32 ref: 004175C7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                    • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                    • API String ID: 4188446516-3035715614
                                    • Opcode ID: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                    • Instruction ID: f03761d26bac9a2bfb1ad98f85ac7da09ef0bd98ba300517d6d91d37beebd467
                                    • Opcode Fuzzy Hash: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                    • Instruction Fuzzy Hash: EEA17C71508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E775E984CB6A
                                    APIs
                                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                                    • ExitProcess.KERNEL32 ref: 0041151D
                                      • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                      • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                      • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                                      • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                                    • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                                    • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                                      • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                      • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                      • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                    • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                                    • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                                    • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                                    • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0041143B
                                      • Part of subcall function 0041B58F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5EB
                                      • Part of subcall function 0041B58F: WriteFile.KERNEL32(00000000,00000000,00000000,004061FD,00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5FF
                                      • Part of subcall function 0041B58F: CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B60C
                                    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00411483
                                    • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                                    • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                                    • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                                      • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                                    • String ID: .exe$0DG$@CG$T@$WDH$exepath$open$temp_
                                    • API String ID: 4250697656-2665858469
                                    • Opcode ID: b68df8224523070e2f82cd34dc7b2adce00a37accb578c29d62ccc5e9000c55b
                                    • Instruction ID: b1cd6038c3dd2fca16f1d1fb39a824579eeb1b45f376adef666059b0b2e54ae4
                                    • Opcode Fuzzy Hash: b68df8224523070e2f82cd34dc7b2adce00a37accb578c29d62ccc5e9000c55b
                                    • Instruction Fuzzy Hash: D751B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                                    APIs
                                      • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,?,0040C67D), ref: 004116A9
                                      • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF,?,0040C67D), ref: 004116BC
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C013
                                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C056
                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C065
                                      • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                      • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                      • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                      • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C280
                                    • ExitProcess.KERNEL32 ref: 0040C287
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                    • String ID: ")$.vbs$@CG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                    • API String ID: 3797177996-1998216422
                                    • Opcode ID: 883dd6237c2439e62c6c4d6e1d1363d8ac585ac6f2030a33dfbc69a2c4302e6f
                                    • Instruction ID: 1063ce1f4075510d90626cdc8b34ac690c3cf2dc76fa2c9c3337a4c1feab76e8
                                    • Opcode Fuzzy Hash: 883dd6237c2439e62c6c4d6e1d1363d8ac585ac6f2030a33dfbc69a2c4302e6f
                                    • Instruction Fuzzy Hash: B78191316042005BC315FB21D862ABF77A9ABD1308F10453FF586A71E2EF7CAD49869E
                                    APIs
                                    • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2B2
                                    • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A2C6
                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2EE
                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00473EE8,00000000), ref: 0041A2FF
                                    • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A340
                                    • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A358
                                    • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A36D
                                    • SetEvent.KERNEL32 ref: 0041A38A
                                    • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A39B
                                    • CloseHandle.KERNEL32 ref: 0041A3AB
                                    • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A3CD
                                    • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A3D7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                    • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$>G
                                    • API String ID: 738084811-1408154895
                                    • Opcode ID: 67a24f6113aabf6128109dc61cf26ab2441941a35e225fe1c9d441213504bd5b
                                    • Instruction ID: 9d48d6c6e0579c1e833a8367b0d02802659df9f73890df0c3e8ff2b6504ede8e
                                    • Opcode Fuzzy Hash: 67a24f6113aabf6128109dc61cf26ab2441941a35e225fe1c9d441213504bd5b
                                    • Instruction Fuzzy Hash: 9A51C2712443056AD214BB31DC82EBF3B5CEB91758F10043FF455A21E2EE389D9986AF
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                    • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                                    • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                                    • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                                    • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                                    • WriteFile.KERNEL32(00000000,00471B02,00000002,00000000,00000000), ref: 00401CE0
                                    • WriteFile.KERNEL32(00000000,00471B04,00000004,00000000,00000000), ref: 00401CF0
                                    • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                                    • WriteFile.KERNEL32(00000000,00471B0E,00000002,00000000,00000000), ref: 00401D22
                                    • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Write$Create
                                    • String ID: RIFF$WAVE$data$fmt
                                    • API String ID: 1602526932-4212202414
                                    • Opcode ID: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                    • Instruction ID: 129ba3454a43ec42bedb537cb07bfa8f9eb5569c2d2d4c431363fc199bcfbd5c
                                    • Opcode Fuzzy Hash: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                    • Instruction Fuzzy Hash: 66416F726443187AE210DB51DD86FBB7EECEB85F54F40081AFA44D6090E7A4E909DBB3
                                    APIs
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe,00000001,004068B2,C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe,00000003,004068DA,004742E0,00406933), ref: 004064F4
                                    • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                                    • GetProcAddress.KERNEL32(00000000), ref: 00406511
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                                    • GetProcAddress.KERNEL32(00000000), ref: 00406525
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                                    • GetProcAddress.KERNEL32(00000000), ref: 00406539
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                                    • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                                    • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                                    • GetProcAddress.KERNEL32(00000000), ref: 00406561
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                    • API String ID: 1646373207-998253114
                                    • Opcode ID: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                    • Instruction ID: b313d74494c875c8407327c43f2905d2eb3972c2d2e01a1e2b33da4df8ba43a1
                                    • Opcode Fuzzy Hash: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                    • Instruction Fuzzy Hash: 1F011EA4E40B1675DB21677A7C54D176EAC9E502917190433B40AF22B1FEBCD410CD7D
                                    APIs
                                    • lstrlenW.KERNEL32(?), ref: 0041B1D6
                                    • _memcmp.LIBVCRUNTIME ref: 0041B1EE
                                    • lstrlenW.KERNEL32(?), ref: 0041B207
                                    • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B242
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B255
                                    • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B299
                                    • lstrcmpW.KERNEL32(?,?), ref: 0041B2B4
                                    • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2CC
                                    • _wcslen.LIBCMT ref: 0041B2DB
                                    • FindVolumeClose.KERNEL32(?), ref: 0041B2FB
                                    • GetLastError.KERNEL32 ref: 0041B313
                                    • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B340
                                    • lstrcatW.KERNEL32(?,?), ref: 0041B359
                                    • lstrcpyW.KERNEL32(?,?), ref: 0041B368
                                    • GetLastError.KERNEL32 ref: 0041B370
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                    • String ID: ?
                                    • API String ID: 3941738427-1684325040
                                    • Opcode ID: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                    • Instruction ID: 2e0df54dd889987763cd5022c3700ac4418931210c184d5857636408485aa128
                                    • Opcode Fuzzy Hash: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                    • Instruction Fuzzy Hash: 8B416F71508305AAD7209FA1EC8C9EBB7E8EB49715F00096BF541C2261EB78C98887D6
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$EnvironmentVariable$_wcschr
                                    • String ID:
                                    • API String ID: 3899193279-0
                                    • Opcode ID: 2326e67d315155b1cdbcdb335c3f1d7bcfd25c313196754d3a9c20ac7d0f0bef
                                    • Instruction ID: 8ac3cd9939a067627e1c481289c57a7f9f94b657261427fab31af25724b0c78e
                                    • Opcode Fuzzy Hash: 2326e67d315155b1cdbcdb335c3f1d7bcfd25c313196754d3a9c20ac7d0f0bef
                                    • Instruction Fuzzy Hash: 96D13C719007007FFB25AF7B9881A6F7BA4BF02314F0541AFF905A7381E63989418B9D
                                    APIs
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411C9A
                                      • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                                      • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                      • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                    • Sleep.KERNEL32(0000000A,00465324), ref: 00411DEC
                                    • Sleep.KERNEL32(0000000A,00465324,00465324), ref: 00411E8E
                                    • Sleep.KERNEL32(0000000A,00465324,00465324,00465324), ref: 00411F30
                                    • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411F91
                                    • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411FC8
                                    • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00412004
                                    • Sleep.KERNEL32(000001F4,00465324,00465324,00465324), ref: 0041201E
                                    • Sleep.KERNEL32(00000064), ref: 00412060
                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                    • String ID: /stext "$HDG$HDG$>G$>G
                                    • API String ID: 1223786279-3931108886
                                    • Opcode ID: 36ecec2bd287229840889fa2f21ce4d309759ff1e99f2e4f361d0ee51ee9b760
                                    • Instruction ID: 1febf249a593eb43810efab42e14b6693ac358e03ba90545e56d33427da79e18
                                    • Opcode Fuzzy Hash: 36ecec2bd287229840889fa2f21ce4d309759ff1e99f2e4f361d0ee51ee9b760
                                    • Instruction Fuzzy Hash: 960243315083414AC325FB61D891AEFB7D5AFD4308F50493FF88A931E2EF785A49C69A
                                    APIs
                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                    • LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                    • FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                    • LoadLibraryA.KERNEL32(?), ref: 00413F27
                                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                    • FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                    • FreeLibrary.KERNEL32(00000000), ref: 00413F66
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                    • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                    • API String ID: 2490988753-744132762
                                    • Opcode ID: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                    • Instruction ID: a4547f3d416e9253f7b1cbdd0907a67efdadb69b2b53743d1710677937ed8fa2
                                    • Opcode Fuzzy Hash: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                    • Instruction Fuzzy Hash: 6D31C4B1906315A7D320AF25DC44ACBB7ECEF44745F400A2AF844D3201D778DA858AEE
                                    APIs
                                    • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CAE9
                                    • GetCursorPos.USER32(?), ref: 0041CAF8
                                    • SetForegroundWindow.USER32(?), ref: 0041CB01
                                    • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB1B
                                    • Shell_NotifyIconA.SHELL32(00000002,00473B50), ref: 0041CB6C
                                    • ExitProcess.KERNEL32 ref: 0041CB74
                                    • CreatePopupMenu.USER32 ref: 0041CB7A
                                    • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CB8F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                    • String ID: Close
                                    • API String ID: 1657328048-3535843008
                                    • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                    • Instruction ID: a66ed96c0d91d71762f770de87d5f41dd37c70c4e97b210e23d221b2b7ccacbc
                                    • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                    • Instruction Fuzzy Hash: 68212B71188209FFDB064F64FD4EAAA3F65EB04342F044135B906D40B2D7B9EA90EB18
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$Info
                                    • String ID:
                                    • API String ID: 2509303402-0
                                    • Opcode ID: 06a8a26f2c5a7b5fa394c6bff13e2c454eae2c5b2dbf51852f12c512b58d3eba
                                    • Instruction ID: 0af7f9009007d8880989bd470fdb3e4a62bb8e65dbd2af1b74ff5c8893cb1db7
                                    • Opcode Fuzzy Hash: 06a8a26f2c5a7b5fa394c6bff13e2c454eae2c5b2dbf51852f12c512b58d3eba
                                    • Instruction Fuzzy Hash: D0B18F71900605AFEF11DFA9C881BEEBBF4BF49304F14406EF855B7242DA79A8458B64
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                                    • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                                    • __aulldiv.LIBCMT ref: 00407FE9
                                    • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                                    • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                                    • CloseHandle.KERNEL32(00000000), ref: 00408200
                                    • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                                    • CloseHandle.KERNEL32(00000000), ref: 00408256
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                                    • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $>G
                                    • API String ID: 1884690901-3066803209
                                    • Opcode ID: 7205d9af98df91b965123a054d585fa7c0d52e82773df9d6c890248cdbc6b411
                                    • Instruction ID: 222450ca6543349723abdfa1177da379b39b5876d7444fbb960ea0ab75079841
                                    • Opcode Fuzzy Hash: 7205d9af98df91b965123a054d585fa7c0d52e82773df9d6c890248cdbc6b411
                                    • Instruction Fuzzy Hash: DAB191316083409BC214FB25C892AAFB7E5AFD4314F40492EF885632D2EF789945C79B
                                    APIs
                                    • Sleep.KERNEL32(00001388), ref: 00409E62
                                      • Part of subcall function 00409D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                      • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                      • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                      • Part of subcall function 00409D97: CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409E9E
                                    • GetFileAttributesW.KERNEL32(00000000), ref: 00409EAF
                                    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00409EC6
                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                      • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                    • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,00000000,00000000,00000000), ref: 0040A049
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                    • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                                    • API String ID: 3795512280-3163867910
                                    • Opcode ID: 859471ff5ae44976aba126b0bcf56bf0f182264686a8061ac70fe12e31261d66
                                    • Instruction ID: b7dfc09a395f5416f32c5fe597dbb364f69b6ed32616efff49b152d1c9b912f4
                                    • Opcode Fuzzy Hash: 859471ff5ae44976aba126b0bcf56bf0f182264686a8061ac70fe12e31261d66
                                    • Instruction Fuzzy Hash: 30518D716043005ACB05BB72D866ABF769AAFD1309F00053FF886B71E2DF3D9D44869A
                                    APIs
                                    • ___free_lconv_mon.LIBCMT ref: 004500B1
                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F300
                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F312
                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F324
                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F336
                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F348
                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F35A
                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F36C
                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F37E
                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F390
                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3A2
                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3B4
                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3C6
                                      • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3D8
                                    • _free.LIBCMT ref: 004500A6
                                      • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                      • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                    • _free.LIBCMT ref: 004500C8
                                    • _free.LIBCMT ref: 004500DD
                                    • _free.LIBCMT ref: 004500E8
                                    • _free.LIBCMT ref: 0045010A
                                    • _free.LIBCMT ref: 0045011D
                                    • _free.LIBCMT ref: 0045012B
                                    • _free.LIBCMT ref: 00450136
                                    • _free.LIBCMT ref: 0045016E
                                    • _free.LIBCMT ref: 00450175
                                    • _free.LIBCMT ref: 00450192
                                    • _free.LIBCMT ref: 004501AA
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                    • String ID:
                                    • API String ID: 161543041-0
                                    • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                    • Instruction ID: 6df0fc8d0da410edbfddc8482cd9dc810a80ebbb5b2f86b8c24a0bb33e3d08c7
                                    • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                    • Instruction Fuzzy Hash: 96317235500B00AFEB20AA35D845B5B73E5AF42355F15841FF849E7292DF39AC98CB1A
                                    APIs
                                    • __EH_prolog.LIBCMT ref: 0041912D
                                    • GdiplusStartup.GDIPLUS(00473AF0,?,00000000), ref: 0041915F
                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191EB
                                    • Sleep.KERNEL32(000003E8), ref: 0041926D
                                    • GetLocalTime.KERNEL32(?), ref: 0041927C
                                    • Sleep.KERNEL32(00000000,00000018,00000000), ref: 00419365
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                    • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                    • API String ID: 489098229-65789007
                                    • Opcode ID: 8074c6d2a8c5259bdf3f2abb277cb149c52984373f57ca3af48006e7f706a112
                                    • Instruction ID: b922dce7c629cfc9b1bb11cb74a08c0e3353b39699bf4d86e46594d10c943285
                                    • Opcode Fuzzy Hash: 8074c6d2a8c5259bdf3f2abb277cb149c52984373f57ca3af48006e7f706a112
                                    • Instruction Fuzzy Hash: 33519F71A002449ACB14BBB5C856AFE7BA9AB55304F00407FF84AB71D2EF3C5E85C799
                                    APIs
                                    • connect.WS2_32(?,?,?), ref: 004042A5
                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                                    • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                    • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                    • API String ID: 994465650-2151626615
                                    • Opcode ID: 62f3c4882b49c5ff5d63aa71430f88bee7d31ae11dd357ee521aebef95a1510e
                                    • Instruction ID: b196b808fbc66b1ac8da6b4b51d7f626a0d3d22bc4cde50e21f83cd2c7739b74
                                    • Opcode Fuzzy Hash: 62f3c4882b49c5ff5d63aa71430f88bee7d31ae11dd357ee521aebef95a1510e
                                    • Instruction Fuzzy Hash: ED4128B1B00202A7CB04B77A8C5B66D7A55AB81368B40007FF901676D3EE7DAD6087DF
                                    APIs
                                      • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,?,0040C67D), ref: 004116A9
                                      • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF,?,0040C67D), ref: 004116BC
                                      • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                      • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                      • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C826
                                    • ExitProcess.KERNEL32 ref: 0040C832
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                    • String ID: """, 0$.vbs$@CG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                    • API String ID: 1913171305-390638927
                                    • Opcode ID: 0ceb5a7906efabe13d82fb8a69420ea189243682d85e34c24b2e68e6ac54103e
                                    • Instruction ID: a795a6540db69397e2c5d2b70f340dd787df27bacd58b350937fb1c0aad7b7c4
                                    • Opcode Fuzzy Hash: 0ceb5a7906efabe13d82fb8a69420ea189243682d85e34c24b2e68e6ac54103e
                                    • Instruction Fuzzy Hash: A2416D329001185ACB14F762DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID:
                                    • API String ID: 269201875-0
                                    • Opcode ID: 53d41fd9a7ee4e2989e4925aa528ca2cb03ad0a377c341b032d8e4e6b559b5a3
                                    • Instruction ID: 48066223020562dfe8895eb3edc0e70975ef38ab3c96fc6f1fb07286cb8ca08d
                                    • Opcode Fuzzy Hash: 53d41fd9a7ee4e2989e4925aa528ca2cb03ad0a377c341b032d8e4e6b559b5a3
                                    • Instruction Fuzzy Hash: 2BC15772D80204BFEB20DBA9CC82FDE77F89B45704F15416AFA04FB282D6749D458B58
                                    APIs
                                    • WaitForSingleObject.KERNEL32(?,000000FF,00475B70,?,?,00000000,00475B70,004017F3), ref: 004047FD
                                    • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404808
                                    • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404811
                                    • closesocket.WS2_32(?), ref: 0040481F
                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 00404856
                                    • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404867
                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 0040486E
                                    • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404880
                                    • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404885
                                    • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 0040488A
                                    • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404895
                                    • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 0040489A
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                    • String ID:
                                    • API String ID: 3658366068-0
                                    • Opcode ID: 064d6b1f915996a70041b40538a6eeea030a706771223880b65586d948e925f6
                                    • Instruction ID: 5504d0c870acfe65fd0076db90b097e51f0e6d2514c589c74abed5ba37c9c78a
                                    • Opcode Fuzzy Hash: 064d6b1f915996a70041b40538a6eeea030a706771223880b65586d948e925f6
                                    • Instruction Fuzzy Hash: 3C212C71104B149FCB216B26EC45A27BBE1EF40325F104A7EF2E612AF1CB76E851DB48
                                    APIs
                                      • Part of subcall function 00454650: CreateFileW.KERNEL32(00000000,?,?,+JE,?,?,00000000,?,00454A2B,00000000,0000000C), ref: 0045466D
                                    • GetLastError.KERNEL32 ref: 00454A96
                                    • __dosmaperr.LIBCMT ref: 00454A9D
                                    • GetFileType.KERNEL32(00000000), ref: 00454AA9
                                    • GetLastError.KERNEL32 ref: 00454AB3
                                    • __dosmaperr.LIBCMT ref: 00454ABC
                                    • CloseHandle.KERNEL32(00000000), ref: 00454ADC
                                    • CloseHandle.KERNEL32(?), ref: 00454C26
                                    • GetLastError.KERNEL32 ref: 00454C58
                                    • __dosmaperr.LIBCMT ref: 00454C5F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                    • String ID: H
                                    • API String ID: 4237864984-2852464175
                                    • Opcode ID: b64a76ded07e6414476391b57ad8ab2edcfe93df9d200e18b46d3283e817940b
                                    • Instruction ID: 324c09394b40af715295ff654573b8bda7a64cd12b4111e7ce26936e53f9a861
                                    • Opcode Fuzzy Hash: b64a76ded07e6414476391b57ad8ab2edcfe93df9d200e18b46d3283e817940b
                                    • Instruction Fuzzy Hash: B0A148329041044FDF19EF78D8427AE7BA0AB86319F14015EFC159F392DB398C86C75A
                                    APIs
                                    • __Init_thread_footer.LIBCMT ref: 0040A456
                                    • Sleep.KERNEL32(000001F4), ref: 0040A461
                                    • GetForegroundWindow.USER32 ref: 0040A467
                                    • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                                    • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                                    • Sleep.KERNEL32(000003E8), ref: 0040A574
                                      • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                    • String ID: [${ User has been idle for $ minutes }$]
                                    • API String ID: 911427763-3954389425
                                    • Opcode ID: a59f2f13793784003892e63950edf61f9792dfbe12456e4cbfe946a207096c8a
                                    • Instruction ID: 0ecdfa35f4bf358d0b6072dbfc0ad8fc4f94b2a12b5a089c7f39fa9b67fb4d59
                                    • Opcode Fuzzy Hash: a59f2f13793784003892e63950edf61f9792dfbe12456e4cbfe946a207096c8a
                                    • Instruction Fuzzy Hash: C451DF316083005BC614FB21D84AAAE7794BF84318F50493FF846A62E2EF7C9E55C69F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: 65535$udp
                                    • API String ID: 0-1267037602
                                    • Opcode ID: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                    • Instruction ID: a76ad32841e4dbbb66723cf4e0556afe3febbbe66cdf8f55616d13ac9502c32b
                                    • Opcode Fuzzy Hash: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                    • Instruction Fuzzy Hash: 9D4118716083019BD7209F29E905BAB7BD8EF85706F04082FF84197391E76DCEC186AE
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393B9
                                    • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393C6
                                    • __dosmaperr.LIBCMT ref: 004393CD
                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393F9
                                    • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439403
                                    • __dosmaperr.LIBCMT ref: 0043940A
                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043944D
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439457
                                    • __dosmaperr.LIBCMT ref: 0043945E
                                    • _free.LIBCMT ref: 0043946A
                                    • _free.LIBCMT ref: 00439471
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                    • String ID:
                                    • API String ID: 2441525078-0
                                    • Opcode ID: ab6d6df52fdda21e78bda597108ea35d8248e36eca260e6751756a241cd45372
                                    • Instruction ID: 902c93592471d116807dca9985149206a76c62e8192f2f9a6cc20a0486345b12
                                    • Opcode Fuzzy Hash: ab6d6df52fdda21e78bda597108ea35d8248e36eca260e6751756a241cd45372
                                    • Instruction Fuzzy Hash: F531F17140820ABBEF11AFA5DC449AF3B78EF09364F14016AF81066291DB79CC12DBA9
                                    APIs
                                    • SetEvent.KERNEL32(?,?), ref: 00404E71
                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                                    • TranslateMessage.USER32(?), ref: 00404F30
                                    • DispatchMessageA.USER32(?), ref: 00404F3B
                                    • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 00404FF3
                                    • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                    • String ID: CloseChat$DisplayMessage$GetMessage
                                    • API String ID: 2956720200-749203953
                                    • Opcode ID: 58bd3a0ae6df6a0bdf912a68ced102d79291154801096aaee71947f3f084d5d0
                                    • Instruction ID: a70547b48422ce96676d24762269450ce3f1821fc9982c67352fb5fd346d99ba
                                    • Opcode Fuzzy Hash: 58bd3a0ae6df6a0bdf912a68ced102d79291154801096aaee71947f3f084d5d0
                                    • Instruction Fuzzy Hash: F741BFB16043016BC714FB75DC5A8AE77A9ABC1714F40093EF906A31E6EF38DA05C79A
                                    APIs
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                                    • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                                    • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                                    • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00416EF0
                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                    • String ID: <$@$@FG$@FG$Temp
                                    • API String ID: 1107811701-2245803885
                                    • Opcode ID: 248dd396e914dd493217af7d7ad54a5765675a85d7a0f101f9c1831ea090813b
                                    • Instruction ID: 21bac8b1790940aaec7d6d8591dec239f7d6dde33bc15b5890dc9a9e7f2861e5
                                    • Opcode Fuzzy Hash: 248dd396e914dd493217af7d7ad54a5765675a85d7a0f101f9c1831ea090813b
                                    • Instruction Fuzzy Hash: E8319C319002099BCB04FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                                    APIs
                                    • GetCurrentProcess.KERNEL32(00474A28,00000000,BG3i@,00003000,00000004,00000000,00000001), ref: 00406647
                                    • GetCurrentProcess.KERNEL32(00474A28,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe), ref: 00406705
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CurrentProcess
                                    • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir$BG3i@
                                    • API String ID: 2050909247-4145329354
                                    • Opcode ID: a25a50d4c2e43c50d9b1e39939b2cfdedfae0b5b41f18b30c59be5b4ed444aac
                                    • Instruction ID: 423827b33d6c667fb1d0fc3afb55bdad30249121d517be796f0b9763ce16cf58
                                    • Opcode Fuzzy Hash: a25a50d4c2e43c50d9b1e39939b2cfdedfae0b5b41f18b30c59be5b4ed444aac
                                    • Instruction Fuzzy Hash: B2310871250700AFC300AB65EC45F6A37B8EB84716F11043EF50AE76E1EB79A8508B6D
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419C94
                                    • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CAB
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CB8
                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CC7
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CD8
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CDB
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$Open$ControlManager
                                    • String ID:
                                    • API String ID: 221034970-0
                                    • Opcode ID: 90cb661901cd042af288c915e3e3b558208b36f008bb68e694e16de296acffd5
                                    • Instruction ID: aaf019a9b49167a30595a2ca3c371567d0eeee9026f0995440eeab6e66ec65be
                                    • Opcode Fuzzy Hash: 90cb661901cd042af288c915e3e3b558208b36f008bb68e694e16de296acffd5
                                    • Instruction Fuzzy Hash: 00118632901218AFD7116B64EC85DFF3FACDB45BA5B000036F502921D1DB64DD46AAF5
                                    APIs
                                    • _free.LIBCMT ref: 00446DDF
                                      • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                      • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                    • _free.LIBCMT ref: 00446DEB
                                    • _free.LIBCMT ref: 00446DF6
                                    • _free.LIBCMT ref: 00446E01
                                    • _free.LIBCMT ref: 00446E0C
                                    • _free.LIBCMT ref: 00446E17
                                    • _free.LIBCMT ref: 00446E22
                                    • _free.LIBCMT ref: 00446E2D
                                    • _free.LIBCMT ref: 00446E38
                                    • _free.LIBCMT ref: 00446E46
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                    • Instruction ID: b6db37451886405a3c03f61b360184b61b1678451e8b30ee63348233c964278a
                                    • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                    • Instruction Fuzzy Hash: F011E975100408BFEB01EF55C842CDD3B65EF46354B06C0AAF9086F222DA35DE649F85
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Eventinet_ntoa
                                    • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                                    • API String ID: 3578746661-4192532303
                                    • Opcode ID: f618aebd5914055e84a68918ded0309d2f8c92263d156693ea11320bfd98c30d
                                    • Instruction ID: 9533851bb4e74ac183efc1d320b4a1154e984465ef7073577260c431c5a81f81
                                    • Opcode Fuzzy Hash: f618aebd5914055e84a68918ded0309d2f8c92263d156693ea11320bfd98c30d
                                    • Instruction Fuzzy Hash: E8518471A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CAD85CB9F
                                    APIs
                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00455DAF), ref: 0045515C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DecodePointer
                                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                                    • API String ID: 3527080286-3064271455
                                    • Opcode ID: 3eb206b15bda214751c6835efce86a307732660d26cd42cbd6c0713da10ca2d5
                                    • Instruction ID: 89d0c260ad138193cc60bb845925db7455dcb75d1c4d79333749f45855522aa5
                                    • Opcode Fuzzy Hash: 3eb206b15bda214751c6835efce86a307732660d26cd42cbd6c0713da10ca2d5
                                    • Instruction Fuzzy Hash: DA516D70900E09CBCF14DF99E9581BDBBB0FB09342F244297EC41A6266CB798A1DCB1D
                                    APIs
                                    • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0041665C
                                      • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                    • Sleep.KERNEL32(00000064), ref: 00416688
                                    • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CreateDeleteExecuteShellSleep
                                    • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                    • API String ID: 1462127192-2001430897
                                    • Opcode ID: 6f7592da00a282af32ff41b540dad8098d47f26c763fabcb562c03d6f79861a4
                                    • Instruction ID: 72b86f905f1643b809cd09d25b02ba286255726e8958c1b91c3bd62dba73c542
                                    • Opcode Fuzzy Hash: 6f7592da00a282af32ff41b540dad8098d47f26c763fabcb562c03d6f79861a4
                                    • Instruction Fuzzy Hash: FD313E719001085ADB14FBA1DC96EEE7764AF50708F00013FF906731E2EF786A8ACA9D
                                    APIs
                                    • _strftime.LIBCMT ref: 00401AD3
                                      • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                    • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                                    • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                                    • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                    • String ID: %Y-%m-%d %H.%M$.wav$`=G$x=G
                                    • API String ID: 3809562944-3643129801
                                    • Opcode ID: 05fbe3f0275308aa01def130e1c9f559704be22902734a160a2ccb4d88025906
                                    • Instruction ID: ec6e8c75c27496dd15f6dcc160753dc5291fcfbcfc36b55cd818fae73feeac55
                                    • Opcode Fuzzy Hash: 05fbe3f0275308aa01def130e1c9f559704be22902734a160a2ccb4d88025906
                                    • Instruction Fuzzy Hash: 6C317E315053009BC314EF25DC56A9E77E8BB94314F00883EF559A21F1EF78AA49CB9A
                                    APIs
                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                                    • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                                    • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                                    • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                                    • waveInStart.WINMM ref: 00401A81
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                    • String ID: XCG$`=G$x=G
                                    • API String ID: 1356121797-903574159
                                    • Opcode ID: 4fec801bf293db6df151fde61eeb5f786b1727cfb1468d64e42c9e242be372bd
                                    • Instruction ID: 1c4952ee711c82e1d68262a7885cb64ec938acb60d992cd4a46dee1db52e037b
                                    • Opcode Fuzzy Hash: 4fec801bf293db6df151fde61eeb5f786b1727cfb1468d64e42c9e242be372bd
                                    • Instruction Fuzzy Hash: 87215C316012009BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C988
                                      • Part of subcall function 0041CA1F: RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                      • Part of subcall function 0041CA1F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                      • Part of subcall function 0041CA1F: GetLastError.KERNEL32 ref: 0041CA91
                                    • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9BF
                                    • lstrcpynA.KERNEL32(00473B68,Remcos,00000080), ref: 0041C9D9
                                    • Shell_NotifyIconA.SHELL32(00000000,00473B50), ref: 0041C9EF
                                    • TranslateMessage.USER32(?), ref: 0041C9FB
                                    • DispatchMessageA.USER32(?), ref: 0041CA05
                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA12
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                    • String ID: Remcos
                                    • API String ID: 1970332568-165870891
                                    • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                    • Instruction ID: 0af2178feff80faf092f0d4c6bffee9b758878d1eb04e36c9ad6546aee081b39
                                    • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                    • Instruction Fuzzy Hash: 760121B1944344ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a2fd919219da5dceb4fadf527de6f56cb4df21625ee46edd218c435833ca4f57
                                    • Instruction ID: 1e235cce983953b2f50cc3566bc78ab2d8216d31b9fa4c429b6f00869d8f9d70
                                    • Opcode Fuzzy Hash: a2fd919219da5dceb4fadf527de6f56cb4df21625ee46edd218c435833ca4f57
                                    • Instruction Fuzzy Hash: 27C1D774D04249AFEF11DFA9C8417AEBBB4FF4A304F14405AE814A7392C778D941CBA9
                                    APIs
                                    • GetCPInfo.KERNEL32(?,?), ref: 00452BD6
                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452C59
                                    • __alloca_probe_16.LIBCMT ref: 00452C91
                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452CEC
                                    • __alloca_probe_16.LIBCMT ref: 00452D3B
                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452D03
                                      • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452D7F
                                    • __freea.LIBCMT ref: 00452DAA
                                    • __freea.LIBCMT ref: 00452DB6
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                    • String ID:
                                    • API String ID: 201697637-0
                                    • Opcode ID: 5a84a6a5317ae172974df595155495cbc46435c9615446bda379f5f3d343e1a3
                                    • Instruction ID: c0da75549b7b47b94c7346473649b17197e9394d7568cc7349c1d05b16f9ad8a
                                    • Opcode Fuzzy Hash: 5a84a6a5317ae172974df595155495cbc46435c9615446bda379f5f3d343e1a3
                                    • Instruction Fuzzy Hash: F391D872E002169BDF218E64CA51EEF7BB5AF0A315F14055BEC04E7243D7A9DC48CB68
                                    APIs
                                      • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                      • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                      • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                      • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                    • _memcmp.LIBVCRUNTIME ref: 004446A3
                                    • _free.LIBCMT ref: 00444714
                                    • _free.LIBCMT ref: 0044472D
                                    • _free.LIBCMT ref: 0044475F
                                    • _free.LIBCMT ref: 00444768
                                    • _free.LIBCMT ref: 00444774
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorLast$_abort_memcmp
                                    • String ID: C
                                    • API String ID: 1679612858-1037565863
                                    • Opcode ID: 4045a2e03b7b0fda526f0a9e820ad73f36c10bcbe96ad2bd9ebfcc8c6ddf23ea
                                    • Instruction ID: 3c523a64da6f7cdf058c983f33271b3c05ff2f19a58e511a78fa6d1555c07658
                                    • Opcode Fuzzy Hash: 4045a2e03b7b0fda526f0a9e820ad73f36c10bcbe96ad2bd9ebfcc8c6ddf23ea
                                    • Instruction Fuzzy Hash: 19B13975A012199FEB24DF18C885BAEB7B4FB49304F1485AEE909A7350D739AE90CF44
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: tcp$udp
                                    • API String ID: 0-3725065008
                                    • Opcode ID: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                    • Instruction ID: e59cad8d3053530f07be13ad944632c35d9115139dfdf9e987abb4c2b311e0ee
                                    • Opcode Fuzzy Hash: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                    • Instruction Fuzzy Hash: 9171AB316083128FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID: gKE$HE$HE
                                    • API String ID: 269201875-2777690135
                                    • Opcode ID: 7800a519142f47635a8271b71284b9659b79823d2b8030c83ffac0f9e2146641
                                    • Instruction ID: 4134de32792d44acead4bb36f8da9b5b282593f8ffe10db144b1eaf4d9577b64
                                    • Opcode Fuzzy Hash: 7800a519142f47635a8271b71284b9659b79823d2b8030c83ffac0f9e2146641
                                    • Instruction Fuzzy Hash: 90412A31A009106BEF24AABA8CD5A7F3B64DF45375F14031BFC1896293D67C8C4996AA
                                    APIs
                                    • ExitThread.KERNEL32 ref: 004017F4
                                      • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                      • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                                    • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                                      • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                    • __Init_thread_footer.LIBCMT ref: 004017BC
                                      • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                      • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                    • String ID: T=G$p[G$>G$>G
                                    • API String ID: 1596592924-2461731529
                                    • Opcode ID: 8f70ea2b40fb44211d0b69bbfe51e678a1d722ca5741e51af6e8456a38407156
                                    • Instruction ID: b2aa677fe1363808454ef9d3704f93b9908b7cd688e3fd59dcdd6ad405d7ff49
                                    • Opcode Fuzzy Hash: 8f70ea2b40fb44211d0b69bbfe51e678a1d722ca5741e51af6e8456a38407156
                                    • Instruction Fuzzy Hash: 0D41A0316042019BC324FB65DCA6EAE73A4EB94318F00453FF54AA71F2DF78A945C65E
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                    • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                    • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                    • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                                    • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                      • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                      • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                    • String ID: .part
                                    • API String ID: 1303771098-3499674018
                                    • Opcode ID: bc587de7adb1460b3aabd07d1d3e6798b8d85c5b62109ba090974b2b68d51c1e
                                    • Instruction ID: a9f2b94bfe891e644ef5b97f564769cd4b441703f4f7d546a0b6aea2ef9939f1
                                    • Opcode Fuzzy Hash: bc587de7adb1460b3aabd07d1d3e6798b8d85c5b62109ba090974b2b68d51c1e
                                    • Instruction Fuzzy Hash: 1C31C2715083019FD210EF21DD459AFB7A8FB85715F40093FF9C6A21A1DB38AA48CB9A
                                    APIs
                                      • Part of subcall function 00412584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004125A6
                                      • Part of subcall function 00412584: RegQueryValueExW.ADVAPI32(?,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                                      • Part of subcall function 00412584: RegCloseKey.ADVAPI32(?), ref: 004125CE
                                      • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                    • _wcslen.LIBCMT ref: 0041A8F6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                    • String ID: .exe$:@$XCG$http\shell\open\command$program files (x86)\$program files\
                                    • API String ID: 37874593-703403762
                                    • Opcode ID: 8d7f7000506fb44ae307e9e559f48fe1fd4854344d8ef950826ae216f426f9bc
                                    • Instruction ID: cf464564bb47d370653928ac6653466accee15d45f6204cdc17a1bec324f9b19
                                    • Opcode Fuzzy Hash: 8d7f7000506fb44ae307e9e559f48fe1fd4854344d8ef950826ae216f426f9bc
                                    • Instruction Fuzzy Hash: 3021B8727001043BDB04BAB58C96DEE366D9B85358F14083FF402F72C2ED3C9D5942A9
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042CE53,?,?,?,00449BA1,00000001,00000001,?), ref: 004499AA
                                    • __alloca_probe_16.LIBCMT ref: 004499E2
                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042CE53,?,?,?,00449BA1,00000001,00000001,?), ref: 00449A30
                                    • __alloca_probe_16.LIBCMT ref: 00449AC7
                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B2A
                                    • __freea.LIBCMT ref: 00449B37
                                      • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                    • __freea.LIBCMT ref: 00449B40
                                    • __freea.LIBCMT ref: 00449B65
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                    • String ID:
                                    • API String ID: 3864826663-0
                                    • Opcode ID: aa8dcda0c36fa9ba79fa8fe966d6c0ac5dcd12a00e8d66bfa7c578b9a9788745
                                    • Instruction ID: d3450b84a68f20df6837e20b70452335b33749c243a385fd48b45426a0ff81fe
                                    • Opcode Fuzzy Hash: aa8dcda0c36fa9ba79fa8fe966d6c0ac5dcd12a00e8d66bfa7c578b9a9788745
                                    • Instruction Fuzzy Hash: 89511572610246AFFB258F65DC81EBB77A9EB44754F15462EFC04E6240EF38EC40E668
                                    APIs
                                    • SendInput.USER32 ref: 00418B08
                                    • SendInput.USER32(00000001,?,0000001C), ref: 00418B30
                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B57
                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B75
                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B95
                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BBA
                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BDC
                                    • SendInput.USER32(00000001,?,0000001C), ref: 00418BFF
                                      • Part of subcall function 00418AB1: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418AB7
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InputSend$Virtual
                                    • String ID:
                                    • API String ID: 1167301434-0
                                    • Opcode ID: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                    • Instruction ID: ee8b26819532887277ba411a2a2a0296f2420856d0f10470abe43a11d9a37015
                                    • Opcode Fuzzy Hash: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                    • Instruction Fuzzy Hash: 3231A471248345AAE210DF65D841FDFFBECAFC5B44F04080FB98457291DAA4D98C87AB
                                    APIs
                                    • OpenClipboard.USER32 ref: 00415A46
                                    • EmptyClipboard.USER32 ref: 00415A54
                                    • CloseClipboard.USER32 ref: 00415A5A
                                    • OpenClipboard.USER32 ref: 00415A61
                                    • GetClipboardData.USER32(0000000D), ref: 00415A71
                                    • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                    • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                    • CloseClipboard.USER32 ref: 00415A89
                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                    • String ID:
                                    • API String ID: 2172192267-0
                                    • Opcode ID: ed1c07982b29d0ead8c7efce27f1f73f7a3c6531811b5a16733390c9f1490fe0
                                    • Instruction ID: 9b100a12d13cc6c4196ee8fc3e520842cce62831b2d72284ea91ff5550736cd9
                                    • Opcode Fuzzy Hash: ed1c07982b29d0ead8c7efce27f1f73f7a3c6531811b5a16733390c9f1490fe0
                                    • Instruction Fuzzy Hash: A10152312083009FC314BB75EC5AAEE77A5AFC0762F41457EFD06861A2DF38C845D65A
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID:
                                    • API String ID: 269201875-0
                                    • Opcode ID: 714fb272f4c7917b76c675d30aae230e33aac3baeb4f8630fb8b603ed7da88bc
                                    • Instruction ID: 5fecc71d39e6a90402c47f7728bb4f6831cdfeb90858b0dfc168023e2edb8b83
                                    • Opcode Fuzzy Hash: 714fb272f4c7917b76c675d30aae230e33aac3baeb4f8630fb8b603ed7da88bc
                                    • Instruction Fuzzy Hash: 2361BFB1900205AFEB20DF69C841BAABBF4EB45720F24417BE944FB392E7349D45CB59
                                    APIs
                                      • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                    • _free.LIBCMT ref: 00444086
                                    • _free.LIBCMT ref: 0044409D
                                    • _free.LIBCMT ref: 004440BC
                                    • _free.LIBCMT ref: 004440D7
                                    • _free.LIBCMT ref: 004440EE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$AllocateHeap
                                    • String ID: J7D
                                    • API String ID: 3033488037-1677391033
                                    • Opcode ID: 38e5a99fceb1209b970ed7ac5d3209ab3957ca8cf69c4f68c5a23a15f0ca7666
                                    • Instruction ID: b5a2c1f2d034459fb850ff781f480331835685433a1d37f27cfcf8091ebf3f31
                                    • Opcode Fuzzy Hash: 38e5a99fceb1209b970ed7ac5d3209ab3957ca8cf69c4f68c5a23a15f0ca7666
                                    • Instruction Fuzzy Hash: 9251E371A00604AFEB20DF6AC841B6AB3F4EF95724F14416EE909D7251E739ED15CB88
                                    APIs
                                    • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044A838,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A105
                                    • __fassign.LIBCMT ref: 0044A180
                                    • __fassign.LIBCMT ref: 0044A19B
                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A1C1
                                    • WriteFile.KERNEL32(?,00000000,00000000,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A1E0
                                    • WriteFile.KERNEL32(?,?,00000001,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A219
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                    • String ID:
                                    • API String ID: 1324828854-0
                                    • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                    • Instruction ID: b40464c9ec282996611fef5cbd20273031f87559cdf671a411eba52403cbf28d
                                    • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                    • Instruction Fuzzy Hash: DB51E270E002099FEB10CFA8D881AEEBBF8FF09300F14416BE815E3391D6749951CB6A
                                    APIs
                                    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412CC1
                                      • Part of subcall function 004129AA: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                      • Part of subcall function 004129AA: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                    • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 00412E31
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseEnumInfoOpenQuerysend
                                    • String ID: TUFTUF$>G$DG$DG
                                    • API String ID: 3114080316-344394840
                                    • Opcode ID: bf697a078cb867d97e45357ac50b9e71af34c85f47cf55f872e92a0cd902ea26
                                    • Instruction ID: 92049c6ae7fba3f13a57cd60a3827c89810429dfa6cf24b756c0ab1f01d338b1
                                    • Opcode Fuzzy Hash: bf697a078cb867d97e45357ac50b9e71af34c85f47cf55f872e92a0cd902ea26
                                    • Instruction Fuzzy Hash: 0141A2316042009BC224F635D9A2AEF7394AFD0708F50843FF94A671E2EF7C5D4986AE
                                    APIs
                                    • _ValidateLocalCookies.LIBCMT ref: 00437AAB
                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AB3
                                    • _ValidateLocalCookies.LIBCMT ref: 00437B41
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B6C
                                    • _ValidateLocalCookies.LIBCMT ref: 00437BC1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 1170836740-1018135373
                                    • Opcode ID: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                                    • Instruction ID: 9404c61c081bc4e6da2099be8a52027e1297fde76841380def533d3eaa533744
                                    • Opcode Fuzzy Hash: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                                    • Instruction Fuzzy Hash: CD410970A04209DBCF20EF19C844A9FBBB5AF0932CF14915BE8556B392D739EE05CB95
                                    APIs
                                      • Part of subcall function 00412513: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                                      • Part of subcall function 00412513: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                                      • Part of subcall function 00412513: RegCloseKey.KERNELBASE(?), ref: 0041255F
                                    • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                                    • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                    • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                    • API String ID: 1133728706-4073444585
                                    • Opcode ID: f18917443f7c6820299f50b24860e0ced39b7309a667dc30009aa6e24bb425c3
                                    • Instruction ID: d844a8c095f6bc09782a4352348c5dfd082864f820bca84d12e352ec49be167e
                                    • Opcode Fuzzy Hash: f18917443f7c6820299f50b24860e0ced39b7309a667dc30009aa6e24bb425c3
                                    • Instruction Fuzzy Hash: 5F216D71A00109A6CB04F7B2DCA69EE7764AE95318F40013FE902771D2EB7C9A49C6DE
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a689da314200d05c27aed096e5791327431372d8d81dee2cdc260883e4ab0459
                                    • Instruction ID: 969edc756a0dffe936139f0dc9bce31aed38431af2e56c5058bd22e5c2f4fad6
                                    • Opcode Fuzzy Hash: a689da314200d05c27aed096e5791327431372d8d81dee2cdc260883e4ab0459
                                    • Instruction Fuzzy Hash: 991124B1508654FBDB202F769C4493B3B6CEF82376B10016FFC15D7242DA7C8805C2AA
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBFC
                                    • int.LIBCPMT ref: 0040FC0F
                                      • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                      • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                    • std::_Facet_Register.LIBCPMT ref: 0040FC4B
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC71
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC8D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                    • String ID: P[G
                                    • API String ID: 2536120697-571123470
                                    • Opcode ID: 31ce6fe8dfd7390de1d64992225249e105d572f1378bab70f4a441faf385e78a
                                    • Instruction ID: a46b155a0a589d4ea75c4983af6a631921b9d9812a15003568faaf62f6f01cf1
                                    • Opcode Fuzzy Hash: 31ce6fe8dfd7390de1d64992225249e105d572f1378bab70f4a441faf385e78a
                                    • Instruction Fuzzy Hash: 7611F331904518A7CB14FBA5D8469DEB7689E44358B20007BF905B72C1EB7CAE45C79D
                                    APIs
                                    • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A53E
                                    • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A554
                                    • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A56D
                                    • InternetCloseHandle.WININET(00000000), ref: 0041A5B3
                                    • InternetCloseHandle.WININET(00000000), ref: 0041A5B6
                                    Strings
                                    • http://geoplugin.net/json.gp, xrefs: 0041A54E
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$CloseHandleOpen$FileRead
                                    • String ID: http://geoplugin.net/json.gp
                                    • API String ID: 3121278467-91888290
                                    • Opcode ID: 8d796e82819d20c7747317835cdf85fb334a8da14db2c504802a4fd71c56bfc3
                                    • Instruction ID: 402fbdb1aff19a1981f8347c65821a4f206ec005c70a85ea4635686413b1fe25
                                    • Opcode Fuzzy Hash: 8d796e82819d20c7747317835cdf85fb334a8da14db2c504802a4fd71c56bfc3
                                    • Instruction Fuzzy Hash: 2711C87110A3126BD214AA169C45DBF7FDCEF46365F00053EF905D2191DB689C48C6B6
                                    APIs
                                      • Part of subcall function 0044FA22: _free.LIBCMT ref: 0044FA4B
                                    • _free.LIBCMT ref: 0044FD29
                                      • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                      • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                    • _free.LIBCMT ref: 0044FD34
                                    • _free.LIBCMT ref: 0044FD3F
                                    • _free.LIBCMT ref: 0044FD93
                                    • _free.LIBCMT ref: 0044FD9E
                                    • _free.LIBCMT ref: 0044FDA9
                                    • _free.LIBCMT ref: 0044FDB4
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                    • Instruction ID: b6f47af98b99390d2ca34363280ce03bc5e4d1be0f6c4f29549f69d6ae0d3a9a
                                    • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                    • Instruction Fuzzy Hash: 5F119031711B04B6F520FBB2CC07FCBB7DC9F42308F814C2EB29E76152E628A9184645
                                    APIs
                                    • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe), ref: 00406835
                                      • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                      • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                    • CoUninitialize.OLE32 ref: 0040688E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InitializeObjectUninitialize_wcslen
                                    • String ID: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                    • API String ID: 3851391207-4261110203
                                    • Opcode ID: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                    • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                                    • Opcode Fuzzy Hash: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                    • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040FEDF
                                    • int.LIBCPMT ref: 0040FEF2
                                      • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                      • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                    • std::_Facet_Register.LIBCPMT ref: 0040FF2E
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FF54
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FF70
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                    • String ID: H]G
                                    • API String ID: 2536120697-1717957184
                                    • Opcode ID: 3e4a8574ab9db7722bfa12a95caa071d2d4e3d0815d43ad0032f2c9a3dec5087
                                    • Instruction ID: c39742161ac3258eace465d30f2780732a1ff9819e97f4bd037edafe9ec39b9f
                                    • Opcode Fuzzy Hash: 3e4a8574ab9db7722bfa12a95caa071d2d4e3d0815d43ad0032f2c9a3dec5087
                                    • Instruction Fuzzy Hash: 9011BF31900419ABCB24FBA5C8468DDB7799F95318B20007FF505B72C1EB78AF09C799
                                    APIs
                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                                    • GetLastError.KERNEL32 ref: 0040B2EE
                                    Strings
                                    • UserProfile, xrefs: 0040B2B4
                                    • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                                    • [Chrome Cookies not found], xrefs: 0040B308
                                    • [Chrome Cookies found, cleared!], xrefs: 0040B314
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DeleteErrorFileLast
                                    • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                    • API String ID: 2018770650-304995407
                                    • Opcode ID: 89984b89c506dd7c72a5c030867ac5c43e97c4af1a23029286eaf0e318e25243
                                    • Instruction ID: 647c9f6895dd19beb09db90be4e639f81332b1b521455d1adc7a9c6a9ee315b4
                                    • Opcode Fuzzy Hash: 89984b89c506dd7c72a5c030867ac5c43e97c4af1a23029286eaf0e318e25243
                                    • Instruction Fuzzy Hash: 3301A23164410557CB047BB5DD6B8AF3624ED50708F60013FF802B32E2FE3A9A0586CE
                                    APIs
                                    • AllocConsole.KERNEL32(00474358), ref: 0041BEB9
                                    • ShowWindow.USER32(00000000,00000000), ref: 0041BED2
                                    • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041BEF7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Console$AllocOutputShowWindow
                                    • String ID: Remcos v$5.3.0 Pro$CONOUT$
                                    • API String ID: 2425139147-2527699604
                                    • Opcode ID: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                    • Instruction ID: 482f1cdaf256b8236abc94a0b12de3dc55517b66349f776fa4240982defd8f75
                                    • Opcode Fuzzy Hash: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                    • Instruction Fuzzy Hash: 180171B19803047BD600FBF29D4BFDD37AC9B14705F5004277644E7093EABCA554866D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: (CG$C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe$BG
                                    • API String ID: 0-1472829900
                                    • Opcode ID: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                                    • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                                    • Opcode Fuzzy Hash: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                                    • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                                    APIs
                                    • __allrem.LIBCMT ref: 00439789
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397A5
                                    • __allrem.LIBCMT ref: 004397BC
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397DA
                                    • __allrem.LIBCMT ref: 004397F1
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043980F
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                    • String ID:
                                    • API String ID: 1992179935-0
                                    • Opcode ID: b8fade3388712e20a6f67c03e6901a2274372487572bf270bb9750812de2a36e
                                    • Instruction ID: 29148231e9435c1f59b8c02308e8e4f0c882d016d38a0f6ab7871d26eba04b65
                                    • Opcode Fuzzy Hash: b8fade3388712e20a6f67c03e6901a2274372487572bf270bb9750812de2a36e
                                    • Instruction Fuzzy Hash: 7A811B726017069BE724AE79CC82B6F73A8AF49328F24512FF511D66C1E7B8DD018B58
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __cftoe
                                    • String ID:
                                    • API String ID: 4189289331-0
                                    • Opcode ID: 6857f65105857f94604de097a755c155121e7cc81d429690707872ca309dbf5f
                                    • Instruction ID: 646e0444ce84107b4b6d0ff1d92098e8eb0dfa86acef9ec08128487301265115
                                    • Opcode Fuzzy Hash: 6857f65105857f94604de097a755c155121e7cc81d429690707872ca309dbf5f
                                    • Instruction Fuzzy Hash: A851FC72900105ABFB249F598C81F6F77A9EFC9324F15421FF815A6281DB3DDD01866D
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __freea$__alloca_probe_16
                                    • String ID: a/p$am/pm
                                    • API String ID: 3509577899-3206640213
                                    • Opcode ID: ef0e82919ac3b8602debd5a299a6af15dd8aa9f36d72cee99fb0876ec95c8b0f
                                    • Instruction ID: cf09b504ad0dd49156c227457699755419044adef71e8be36bbdd309731302d4
                                    • Opcode Fuzzy Hash: ef0e82919ac3b8602debd5a299a6af15dd8aa9f36d72cee99fb0876ec95c8b0f
                                    • Instruction Fuzzy Hash: 5FD1F271A00206EAFB249F68D945ABBB7B0FF06300F26415BE905AB749D37D8D41CB5B
                                    APIs
                                    • Sleep.KERNEL32(00000000), ref: 00403E8A
                                      • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: H_prologSleep
                                    • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$P>G
                                    • API String ID: 3469354165-462540288
                                    • Opcode ID: 31abcf91a9c0a2940c762d115af403ff2fb7db6f2be07adbf974c185df1571b3
                                    • Instruction ID: 0dce3c58988623f436d5c5d916b021fc345e3c2d86dff9f08dc17926b78fee06
                                    • Opcode Fuzzy Hash: 31abcf91a9c0a2940c762d115af403ff2fb7db6f2be07adbf974c185df1571b3
                                    • Instruction Fuzzy Hash: A441A330A0420197CA14FB79C816AAD3A655B45704F00453FF809A73E2EF7C9A45C7CF
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419DFC
                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E10
                                    • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E1D
                                    • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00419507), ref: 00419E52
                                    • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E64
                                    • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E67
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                    • String ID:
                                    • API String ID: 493672254-0
                                    • Opcode ID: 02b88ba3e7911ce8c5ead6755d78df319317ed7b9ebc03ba342fc4c032229c57
                                    • Instruction ID: c28812c6d5a3476d8c1fe7dae916194da5da8b168be8dbaba893861dad7fc5da
                                    • Opcode Fuzzy Hash: 02b88ba3e7911ce8c5ead6755d78df319317ed7b9ebc03ba342fc4c032229c57
                                    • Instruction Fuzzy Hash: 3301F5311483147AD7119B39EC5EEBF3AACDB42B71F10022BF526D62D1DA68DE8181A9
                                    APIs
                                    • GetLastError.KERNEL32(?,?,00437DFD,004377B1), ref: 00437E14
                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437E22
                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00437E3B
                                    • SetLastError.KERNEL32(00000000,?,00437DFD,004377B1), ref: 00437E8D
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLastValue___vcrt_
                                    • String ID:
                                    • API String ID: 3852720340-0
                                    • Opcode ID: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                                    • Instruction ID: be779a20f6972cc68ff7cd304671387be2c97454b743a33de387a584dbd8fa65
                                    • Opcode Fuzzy Hash: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                                    • Instruction Fuzzy Hash: 2A01D8B222D315ADEB3427757C87A172699EB09779F2013BFF228851E1EF294C41914C
                                    APIs
                                    • GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                    • _free.LIBCMT ref: 00446EF6
                                    • _free.LIBCMT ref: 00446F1E
                                    • SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                                    • SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                    • _abort.LIBCMT ref: 00446F3D
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$_free$_abort
                                    • String ID:
                                    • API String ID: 3160817290-0
                                    • Opcode ID: ee081b98001fac20135d606adf3ebd9ed25e83f06873042332f69cc5cc1fb8f1
                                    • Instruction ID: 3d2b287d931d31d162837175e2379b90ae0e47a7897f975c134f35b9cb22fcab
                                    • Opcode Fuzzy Hash: ee081b98001fac20135d606adf3ebd9ed25e83f06873042332f69cc5cc1fb8f1
                                    • Instruction Fuzzy Hash: 2AF0F93560870177F6226339BD45A6F16559BC37A6F36003FF414A2293EE2D8C46451F
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C2F
                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C43
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C50
                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C5F
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C71
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C74
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$Open$ControlManager
                                    • String ID:
                                    • API String ID: 221034970-0
                                    • Opcode ID: b7b71ddbdcb9800aa748b97a69a48af82292e20b181655901ef109c96cd029b9
                                    • Instruction ID: e05d85410d15b39c35b215a1997cf582e970b4d0c8f2e3caff6268b58306b2a8
                                    • Opcode Fuzzy Hash: b7b71ddbdcb9800aa748b97a69a48af82292e20b181655901ef109c96cd029b9
                                    • Instruction Fuzzy Hash: F2F0F6325003147BD3116B25EC89EFF3BACDB45BA1F000036F902921D2DB68CD4685F5
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D31
                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D45
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D52
                                    • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D61
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D73
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D76
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$Open$ControlManager
                                    • String ID:
                                    • API String ID: 221034970-0
                                    • Opcode ID: e9ecc3ae41f79f47d3bdca3e192fe5417343a180787152718365ee8199a3ebfc
                                    • Instruction ID: 9e91e616c68215657d038be5823d6e3897a30bcf6e0764f9fcdf2292ad9a2404
                                    • Opcode Fuzzy Hash: e9ecc3ae41f79f47d3bdca3e192fe5417343a180787152718365ee8199a3ebfc
                                    • Instruction Fuzzy Hash: C5F062725003146BD2116B65EC89EBF3BACDB45BA5B00003AFA06A21D2DB68DD4696F9
                                    APIs
                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419D96
                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DAA
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DB7
                                    • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DC6
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DD8
                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DDB
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$CloseHandle$Open$ControlManager
                                    • String ID:
                                    • API String ID: 221034970-0
                                    • Opcode ID: 578fdff71443f11c3fca357d736e88dc82f16117349863ef7b695c473245d396
                                    • Instruction ID: abda6543b9bae7672c93be1b0f3a8a56711a85df89096aceaf06b6c73a90a6e4
                                    • Opcode Fuzzy Hash: 578fdff71443f11c3fca357d736e88dc82f16117349863ef7b695c473245d396
                                    • Instruction Fuzzy Hash: C2F0C2325002146BD2116B24FC49EBF3AACDB45BA1B04003AFA06A21D2DB28CE4685F8
                                    APIs
                                    • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                    • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Enum$InfoQueryValue
                                    • String ID: [regsplt]$DG
                                    • API String ID: 3554306468-1089238109
                                    • Opcode ID: 420c64221c8be20a0884beaa9dc5826c3a8ed3ed3fba4086070cd80455fd0dc1
                                    • Instruction ID: 09469598a034e88a10af8fecb22bb8a395a4bc85e225d04bcc93034602455e52
                                    • Opcode Fuzzy Hash: 420c64221c8be20a0884beaa9dc5826c3a8ed3ed3fba4086070cd80455fd0dc1
                                    • Instruction Fuzzy Hash: D8512E72108345AFD310EB61D995DEFB7ECEF84744F00493EB585D2191EB74EA088B6A
                                    APIs
                                      • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                      • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                                      • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                    • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                      • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                      • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                                    • String ID: [End of clipboard]$[Text copied to clipboard]$,]G$0]G
                                    • API String ID: 2974294136-753205382
                                    • Opcode ID: de3fba35412e8d9275b285bd9e157dc8c129506901d01536abad46e7e0bd6fc8
                                    • Instruction ID: 172b4b58ae75f988d3b3a293bba3f35c56e57800f0e036023c2a0486d145437f
                                    • Opcode Fuzzy Hash: de3fba35412e8d9275b285bd9e157dc8c129506901d01536abad46e7e0bd6fc8
                                    • Instruction Fuzzy Hash: 44219F31A002099ACB14FB75D8929EE7774AF54318F50403FF406771E2EF386E4A8A8D
                                    APIs
                                    • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                    • wsprintfW.USER32 ref: 0040A905
                                      • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EventLocalTimewsprintf
                                    • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                    • API String ID: 1497725170-248792730
                                    • Opcode ID: d47f6fbfcddc5f950be7bc6af301cd0dd5aecde9aff08f33bdbb9e4de45e3f1a
                                    • Instruction ID: 8a7b6ca92c081f7f17d03b5bac770d689c192d548357e869dbc211d44db93d1d
                                    • Opcode Fuzzy Hash: d47f6fbfcddc5f950be7bc6af301cd0dd5aecde9aff08f33bdbb9e4de45e3f1a
                                    • Instruction Fuzzy Hash: BB118172400118AACB18BB56EC55CFE77BCAE48325F00013FF842620D1EF7C5A86C6E9
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                    • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                    • CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateHandleSizeSleep
                                    • String ID: `AG
                                    • API String ID: 1958988193-3058481221
                                    • Opcode ID: d7248f5b3272c1b8e158f3ed59b8642bc51f6090f2ebac6ec2a2f06e31ed32df
                                    • Instruction ID: 61dc848fc85204ea7fc5a67171cad01df1347b3512dd41eabc6ad436608203b4
                                    • Opcode Fuzzy Hash: d7248f5b3272c1b8e158f3ed59b8642bc51f6090f2ebac6ec2a2f06e31ed32df
                                    • Instruction Fuzzy Hash: 3A11C4303407406AE731E764E88962B7A9AAB91311F44057EF18562AE3D7389CD1829D
                                    APIs
                                    • RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                    • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                    • GetLastError.KERNEL32 ref: 0041CA91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ClassCreateErrorLastRegisterWindow
                                    • String ID: 0$MsgWindowClass
                                    • API String ID: 2877667751-2410386613
                                    • Opcode ID: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                    • Instruction ID: bff961279ea7560c1ff94ea7b7e8445e3758215821d07408c43b005d8adda241
                                    • Opcode Fuzzy Hash: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                    • Instruction Fuzzy Hash: 2D01E9B1D1431EAB8B01DFE9DCC4AEFBBBDBE49255B50452AE410B2200E7704A448BA5
                                    APIs
                                    • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                                    • CloseHandle.KERNEL32(?), ref: 00406A0F
                                    • CloseHandle.KERNEL32(?), ref: 00406A14
                                    Strings
                                    • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                                    • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle$CreateProcess
                                    • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                    • API String ID: 2922976086-4183131282
                                    • Opcode ID: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                    • Instruction ID: 91eee74bc7ca160cae255ad37e89f65ee2415c19472677646c1a5aeb81073604
                                    • Opcode Fuzzy Hash: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                    • Instruction Fuzzy Hash: 8AF030B69002A9BACB30ABD69C0EFDF7F7DEBC6B11F00042AB615A6051D6745144CAB9
                                    APIs
                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044258A,?,?,0044252A,?), ref: 004425F9
                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044260C
                                    • FreeLibrary.KERNEL32(00000000,?,?,?,0044258A,?,?,0044252A,?), ref: 0044262F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressFreeHandleLibraryModuleProc
                                    • String ID: CorExitProcess$mscoree.dll
                                    • API String ID: 4061214504-1276376045
                                    • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                    • Instruction ID: 32bca75c9846dbfd0145c2b425e1dcbc158e0b1ec8d75d3d798e8c7ef3c4518a
                                    • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                    • Instruction Fuzzy Hash: 14F04430904209FBDB169FA5ED09B9EBFB5EB08756F4140B9F805A2251DF749D40CA9C
                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00475B70,0040483F,00000001,?,?,00000000,00475B70,004017F3), ref: 00404AED
                                    • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404AF9
                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 00404B04
                                    • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404B0D
                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                    • String ID: KeepAlive | Disabled
                                    • API String ID: 2993684571-305739064
                                    • Opcode ID: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                                    • Instruction ID: d6da77504ed7f85403cc54e6f32b3900d2337039667ff8d97479a9328fe4a552
                                    • Opcode Fuzzy Hash: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                                    • Instruction Fuzzy Hash: F8F0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890875B
                                    APIs
                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                    • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00419F64
                                    • PlaySoundW.WINMM(00000000,00000000), ref: 00419F72
                                    • Sleep.KERNEL32(00002710), ref: 00419F79
                                    • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00419F82
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: PlaySound$HandleLocalModuleSleepTime
                                    • String ID: Alarm triggered
                                    • API String ID: 614609389-2816303416
                                    • Opcode ID: 141847ae0a337ee7d375b115724b17f178aaf380715d2b927a7afb315ef2a384
                                    • Instruction ID: 0fe531f7edf44dbbc4d7c544cb5d4c76277d8d7fe89cd9bd4aa838a143c441bc
                                    • Opcode Fuzzy Hash: 141847ae0a337ee7d375b115724b17f178aaf380715d2b927a7afb315ef2a384
                                    • Instruction Fuzzy Hash: 50E09A22A0422033862033BA7C0FC6F3E28DAC6B75B4100BFF905A21A2AE54081086FB
                                    APIs
                                    • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041BF02), ref: 0041BE79
                                    • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BE86
                                    • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041BF02), ref: 0041BE93
                                    • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BEA6
                                    Strings
                                    • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041BE99
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Console$AttributeText$BufferHandleInfoScreen
                                    • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                    • API String ID: 3024135584-2418719853
                                    • Opcode ID: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                    • Instruction ID: 2ebb83c1e7e70c4501562f07591cf8b091918c9767bda4cb27a2f29097fd03e7
                                    • Opcode Fuzzy Hash: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                    • Instruction Fuzzy Hash: C7E04F62104348ABD31437F5BC8ECAB3B7CE784613B100536F612903D3EA7484448A79
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 540239c3c7a8b78e424bcf486381df198cb5d8aead86a72beee1c9aef6a9193c
                                    • Instruction ID: 5f24fa964153eb206603784754227e3bedeb81a57cd12874f4c303f17d5dd595
                                    • Opcode Fuzzy Hash: 540239c3c7a8b78e424bcf486381df198cb5d8aead86a72beee1c9aef6a9193c
                                    • Instruction Fuzzy Hash: FD71C231900216DBEB218F55C884ABFBB75FF55360F14026BEE10A7281D7B89D61CBA9
                                    APIs
                                      • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                                    • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                                    • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                                    • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410C31
                                    • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410D3F
                                    • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                                    • String ID:
                                    • API String ID: 3525466593-0
                                    • Opcode ID: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                    • Instruction ID: 414678d8c61d87a8872ee73c425a8c4ab38aff0ef96490e16bc3f9b9534d1ba0
                                    • Opcode Fuzzy Hash: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                    • Instruction Fuzzy Hash: 1861C270200301ABD720DF66C981BA77BE6BF44744F04412AF9058B786EBF8E8C5CB99
                                    APIs
                                      • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                                    • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                                      • Part of subcall function 0041B187: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B19C
                                      • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                      • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                    • String ID:
                                    • API String ID: 4269425633-0
                                    • Opcode ID: 296a05bfb99c111a27fc262cb636efe6a000d6565ad7e80475f435e5bd850ba0
                                    • Instruction ID: 1ccfc3ca83e07eb3b8bade3b71d1bee95701cef3987deea6625860c00c24977f
                                    • Opcode Fuzzy Hash: 296a05bfb99c111a27fc262cb636efe6a000d6565ad7e80475f435e5bd850ba0
                                    • Instruction Fuzzy Hash: F641E1311083415BC325F761D8A1AEFB7E9EFA4305F50453EF84A931E1EF389A49C65A
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID:
                                    • API String ID: 269201875-0
                                    • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                    • Instruction ID: 1dbcf13812f0ad7c91f1b1cf961d24232ef3b5dad0ac29e3e9285c08b65e5f3f
                                    • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                    • Instruction Fuzzy Hash: 4A41D532E002049FEB24DF79C881A5EB3A5EF89718F15856EE915EB341DB35EE01CB84
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0042CE53,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53), ref: 0044FF20
                                    • __alloca_probe_16.LIBCMT ref: 0044FF58
                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,0042CE53,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53,?), ref: 0044FFA9
                                    • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53,?,00000002,?), ref: 0044FFBB
                                    • __freea.LIBCMT ref: 0044FFC4
                                      • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                    • String ID:
                                    • API String ID: 313313983-0
                                    • Opcode ID: e53b112c27c8f78300b60669bd3e779d88e901d1b4b0f4bdaec59810f61dd2f3
                                    • Instruction ID: fd0d2a6e26420063bd1679c32ed8e9021f1b2be81e6a043fb7466d0fa567ef17
                                    • Opcode Fuzzy Hash: e53b112c27c8f78300b60669bd3e779d88e901d1b4b0f4bdaec59810f61dd2f3
                                    • Instruction Fuzzy Hash: 9831FE32A0021AABEF248F65DC41EAF7BA5EB05314F05017BFC04D6290EB39DD58CBA4
                                    APIs
                                    • GetEnvironmentStringsW.KERNEL32 ref: 0044E144
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E167
                                      • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E18D
                                    • _free.LIBCMT ref: 0044E1A0
                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1AF
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                    • String ID:
                                    • API String ID: 336800556-0
                                    • Opcode ID: 1c337325f04e7d1350835243513ef37ea9cf72bd865eed212f137dea6565717b
                                    • Instruction ID: 38685928f53d0fdec7f9771a1fbcf5508afe04d06d5fe5a1692e2fd93afee85f
                                    • Opcode Fuzzy Hash: 1c337325f04e7d1350835243513ef37ea9cf72bd865eed212f137dea6565717b
                                    • Instruction Fuzzy Hash: 8201B1726417117F73215ABB6C8CC7B6A6DEEC2BA2315013ABD04D6201DA788C0291B9
                                    APIs
                                    • GetLastError.KERNEL32(?,00000000,00000000,0043A7C2,00000000,?,?,0043A846,00000000,00000000,00000000,00000000,00000000,00000000,00402C08,?), ref: 00446F48
                                    • _free.LIBCMT ref: 00446F7D
                                    • _free.LIBCMT ref: 00446FA4
                                    • SetLastError.KERNEL32(00000000), ref: 00446FB1
                                    • SetLastError.KERNEL32(00000000), ref: 00446FBA
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$_free
                                    • String ID:
                                    • API String ID: 3170660625-0
                                    • Opcode ID: f4408b0af08e6f25a576fef194bdae15b87294ed1dfbee705da3a0fd61bfb56a
                                    • Instruction ID: 6bd692df8320938abc1815071491dbd9703328d73d2f54107518a18b095bb187
                                    • Opcode Fuzzy Hash: f4408b0af08e6f25a576fef194bdae15b87294ed1dfbee705da3a0fd61bfb56a
                                    • Instruction Fuzzy Hash: 7401D13620C70067F61266757C85D2F266DDBC3B66727013FF958A2292EE2CCC0A452F
                                    APIs
                                    • _free.LIBCMT ref: 0044F7B5
                                      • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                      • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                    • _free.LIBCMT ref: 0044F7C7
                                    • _free.LIBCMT ref: 0044F7D9
                                    • _free.LIBCMT ref: 0044F7EB
                                    • _free.LIBCMT ref: 0044F7FD
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                    • Instruction ID: 78b16e2cd2bc6e4547488c8f4e3d182d22cf8911186b8f77a4a783cd10448158
                                    • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                    • Instruction Fuzzy Hash: 9AF01232505600BBE620EB59E8C5C1773E9EB827147A9482BF408F7641CB3DFCC48A6C
                                    APIs
                                    • _free.LIBCMT ref: 00443305
                                      • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                      • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                    • _free.LIBCMT ref: 00443317
                                    • _free.LIBCMT ref: 0044332A
                                    • _free.LIBCMT ref: 0044333B
                                    • _free.LIBCMT ref: 0044334C
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                    • Instruction ID: 76e6a482bc9a1727a28655d1f271e5fc3ecde01143ea680422932a64b095765e
                                    • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                    • Instruction Fuzzy Hash: B9F05EF08075209FAB12AF2DBD014893BA0B786755306413BF41EB2772EB380D95DB8E
                                    APIs
                                    • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                                    • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                                    • IsWindowVisible.USER32(?), ref: 004167A1
                                      • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                      • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ProcessWindow$Open$TextThreadVisible
                                    • String ID: (FG
                                    • API String ID: 3142014140-2273637114
                                    • Opcode ID: c7140c968b57e192add68dc6676992042de4a480ef872d90ee77a690e46fad53
                                    • Instruction ID: 6337817d5adb2ff800b6fe7f9081d1b6a06097940366009b721c4d78a1625a25
                                    • Opcode Fuzzy Hash: c7140c968b57e192add68dc6676992042de4a480ef872d90ee77a690e46fad53
                                    • Instruction Fuzzy Hash: FD71E6321082414AC325FB61D8A5ADFB3E4AFE4319F50453EF58A530E1EF746A49C79A
                                    APIs
                                    • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                      • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                      • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                      • Part of subcall function 0041B6AA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6BF
                                      • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                    • String ID: XCG$`AG$>G
                                    • API String ID: 2334542088-2372832151
                                    • Opcode ID: 57430c91427567827473bab5627dcff1f7b98a8ead265141081511e002c0e5a5
                                    • Instruction ID: 7adbea44916697806613a62f0197ef330eb15d5bc584e2d7fa9685cab7613629
                                    • Opcode Fuzzy Hash: 57430c91427567827473bab5627dcff1f7b98a8ead265141081511e002c0e5a5
                                    • Instruction Fuzzy Hash: 865143321042405BC325F775D8A2AEF73D5AFE4308F50483FF84A671E2EE785949C69A
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe,00000104), ref: 00442714
                                    • _free.LIBCMT ref: 004427DF
                                    • _free.LIBCMT ref: 004427E9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$FileModuleName
                                    • String ID: C:\Users\user\Desktop\ORDER AND SPECIFICATIONS.scr.exe
                                    • API String ID: 2506810119-2899369781
                                    • Opcode ID: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                                    • Instruction ID: 3cff5717343a4e3a710d875500e96c622d597d45f5ef159119de948e6b6562f0
                                    • Opcode Fuzzy Hash: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                                    • Instruction Fuzzy Hash: 3E31B371A00218AFEB21DF9ADD81D9EBBFCEB85314F54406BF804A7311D6B88E41DB59
                                    APIs
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                      • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                                      • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                      • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                      • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                    • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                    • String ID: /sort "Visit Time" /stext "$8>G
                                    • API String ID: 368326130-2663660666
                                    • Opcode ID: 1a768b4e587f7e37ad4e89c2dbfac3ccd6e7f3946661fbe69184ab2adc4031be
                                    • Instruction ID: 7eda923cdb9144c2d3fbd791e6ccfb72172be11f11f2a08a3aebfaec1b2861d2
                                    • Opcode Fuzzy Hash: 1a768b4e587f7e37ad4e89c2dbfac3ccd6e7f3946661fbe69184ab2adc4031be
                                    • Instruction Fuzzy Hash: E5317331A0021456CB14FBB6DC969EE7775AF90318F40017FF906B71D2EF385A8ACA99
                                    APIs
                                      • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                                    • ShellExecuteW.SHELL32(?,open,00000000), ref: 0040C632
                                    • ExitProcess.KERNEL32 ref: 0040C63E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateExecuteExitFileProcessShell
                                    • String ID: fso.DeleteFile(Wscript.ScriptFullName)$open
                                    • API String ID: 2309964880-3562070623
                                    • Opcode ID: 2f0c58e4ececc8c02d5b25f260c6243bbcd4e4e86e0679598fae02edbeb9a997
                                    • Instruction ID: 568fed376c07edf90cd2df9b8610832c68d616ac56d6d0e00b2c9eff25916ff3
                                    • Opcode Fuzzy Hash: 2f0c58e4ececc8c02d5b25f260c6243bbcd4e4e86e0679598fae02edbeb9a997
                                    • Instruction Fuzzy Hash: 692145315042405AC324FB25E8969BF77E4AFD1319F50493FF482620F2EF38AA49C69A
                                    APIs
                                    • CreateThread.KERNEL32(00000000,00000000,004099A9,004740F8,00000000,00000000), ref: 0040992A
                                    • CreateThread.KERNEL32(00000000,00000000,00409993,004740F8,00000000,00000000), ref: 0040993A
                                    • CreateThread.KERNEL32(00000000,00000000,004099B5,004740F8,00000000,00000000), ref: 00409946
                                      • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                      • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateThread$LocalTimewsprintf
                                    • String ID: Offline Keylogger Started
                                    • API String ID: 465354869-4114347211
                                    • Opcode ID: 0185d7c11a47f4d1cc67a4ecd2b8329abf3b52d4ddc89e50534bed34fd3ab50c
                                    • Instruction ID: 73cd13916ef890eca76c0e29a3751801184202c96e3ca0ae9416a03768ca9078
                                    • Opcode Fuzzy Hash: 0185d7c11a47f4d1cc67a4ecd2b8329abf3b52d4ddc89e50534bed34fd3ab50c
                                    • Instruction Fuzzy Hash: CF11ABB15003097AD220BA36DC87CBF765CDA813A8B40053EF845225D3EA785E54C6FB
                                    APIs
                                      • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                      • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                    • CreateThread.KERNEL32(00000000,00000000,00409993,?,00000000,00000000), ref: 0040A691
                                    • CreateThread.KERNEL32(00000000,00000000,004099B5,?,00000000,00000000), ref: 0040A69D
                                    • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateThread$LocalTime$wsprintf
                                    • String ID: Online Keylogger Started
                                    • API String ID: 112202259-1258561607
                                    • Opcode ID: 0ab913a718ddbccfb03f45b8536d2eca94befdef1450a1bc42c59ede1cf71113
                                    • Instruction ID: 3917ec9fcb61ff418b23047d8298326e5ff7fd14d64f683336ff9c65b5464130
                                    • Opcode Fuzzy Hash: 0ab913a718ddbccfb03f45b8536d2eca94befdef1450a1bc42c59ede1cf71113
                                    • Instruction Fuzzy Hash: DE01C4916003093AE62076368C87DBF3A6DCA813A8F40043EF541362C3E97D5D5582FB
                                    APIs
                                    • CloseHandle.KERNEL32(00000000,00000000,`@,?,0044A991,`@,0046DD28,0000000C), ref: 0044AAC9
                                    • GetLastError.KERNEL32(?,0044A991,`@,0046DD28,0000000C), ref: 0044AAD3
                                    • __dosmaperr.LIBCMT ref: 0044AAFE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseErrorHandleLast__dosmaperr
                                    • String ID: `@
                                    • API String ID: 2583163307-951712118
                                    • Opcode ID: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                    • Instruction ID: 1bd3c876d7044edfb1a6812000b34c32b622226010ed5631802de8abdb52b33d
                                    • Opcode Fuzzy Hash: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                    • Instruction Fuzzy Hash: F8018E366446201AF7206674698577F77898B82738F2A027FF904972D2DE6DCCC5C19F
                                    APIs
                                    • GetLocalTime.KERNEL32(?), ref: 00404946
                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404994
                                    • CreateThread.KERNEL32(00000000,00000000,00404B1D,?,00000000,00000000), ref: 004049A7
                                    Strings
                                    • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Create$EventLocalThreadTime
                                    • String ID: KeepAlive | Enabled | Timeout:
                                    • API String ID: 2532271599-1507639952
                                    • Opcode ID: 039a83a3673151248ce1c058b5ed99207d7e0ff837a33c13ebd59ef1524b6346
                                    • Instruction ID: c7daaf492e0cec12b0841424890a61be8e5b61f5a3177df3d8f4b9063cedc03f
                                    • Opcode Fuzzy Hash: 039a83a3673151248ce1c058b5ed99207d7e0ff837a33c13ebd59ef1524b6346
                                    • Instruction Fuzzy Hash: 38113AB19042547AC710A7BA8C49BCB7F9C9F86364F00407BF40462192C7789845CBFA
                                    APIs
                                    • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                                    • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                                    • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseEventHandleObjectSingleWait
                                    • String ID: Connection Timeout
                                    • API String ID: 2055531096-499159329
                                    • Opcode ID: a97e81c914b9350505812461b63a63b2fd2cd8a093a8b12f04dedae0d79932b3
                                    • Instruction ID: ea4abd021a31a941d528121f8d879e106695b0b6a7a7fd2d86c7f06b9a048df4
                                    • Opcode Fuzzy Hash: a97e81c914b9350505812461b63a63b2fd2cd8a093a8b12f04dedae0d79932b3
                                    • Instruction Fuzzy Hash: 7A01F5B1940B41AFD325BB3A9C4645ABBE4AB45315700053FF6D392BB1DA38E8408B5A
                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040CDC9
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CE08
                                      • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 004347DC
                                      • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 00434800
                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CE2C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                    • String ID: bad locale name
                                    • API String ID: 3628047217-1405518554
                                    • Opcode ID: 07a2f8cd9595a8075203c453c032e2fb497ed10d9d6fcf4fa69d5ee2e3489bdb
                                    • Instruction ID: 69d9b4558c1556c2c918d31b5ea24064f6fee533cc814fb99c42b36f0b05f267
                                    • Opcode Fuzzy Hash: 07a2f8cd9595a8075203c453c032e2fb497ed10d9d6fcf4fa69d5ee2e3489bdb
                                    • Instruction Fuzzy Hash: 1AF08171400204EAC724FB23D853ACA73A49F54748F90497FB506214D2EF38A618CA8C
                                    APIs
                                    • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                                    • RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                                    • RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateValue
                                    • String ID: Control Panel\Desktop
                                    • API String ID: 1818849710-27424756
                                    • Opcode ID: 3aedce82be745f7a8d31741b6ddf3b86529f340df0cdc46c1cf573c60441b443
                                    • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                                    • Opcode Fuzzy Hash: 3aedce82be745f7a8d31741b6ddf3b86529f340df0cdc46c1cf573c60441b443
                                    • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94
                                    APIs
                                    • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                    • RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                    • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateValue
                                    • String ID: TUF
                                    • API String ID: 1818849710-3431404234
                                    • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                    • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                                    • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                    • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4
                                    APIs
                                    • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004151F4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExecuteShell
                                    • String ID: /C $cmd.exe$open
                                    • API String ID: 587946157-3896048727
                                    • Opcode ID: b29912c7ec69b7e063321f84cff0ad8ed8559f61d9423d2534ea1fccbc267807
                                    • Instruction ID: 3ae8c2b06d9b1922b9065f49b1512f2a4b1b87a12dccb2265ed1bd098505db2c
                                    • Opcode Fuzzy Hash: b29912c7ec69b7e063321f84cff0ad8ed8559f61d9423d2534ea1fccbc267807
                                    • Instruction Fuzzy Hash: D8E030701043006AC708FB61DC95C7F77AC9A80708F10083EB542A21E2EF3CA949C65E
                                    APIs
                                    • TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                    • UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                    • TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: TerminateThread$HookUnhookWindows
                                    • String ID: pth_unenc
                                    • API String ID: 3123878439-4028850238
                                    • Opcode ID: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                    • Instruction ID: c35477c7b81069fed5c639b3d306817a7c517f63bcb5e1090982200d4e51bed9
                                    • Opcode Fuzzy Hash: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                    • Instruction Fuzzy Hash: 32E01DB1209317DFD3101F546C84825B799EB44356324047FF6C155252C5798C54C759
                                    APIs
                                    • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0040143A
                                    • GetProcAddress.KERNEL32(00000000), ref: 00401441
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: GetCursorInfo$User32.dll
                                    • API String ID: 1646373207-2714051624
                                    • Opcode ID: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                    • Instruction ID: fea3bfcfa5ad703f85b7dd8d5f3eac54d033561bc9bd2fc33d3800e380b32b62
                                    • Opcode Fuzzy Hash: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                    • Instruction Fuzzy Hash: 51B092B868A3059BC7306BE0BD0EA093B24EA44703B1000B2F087C12A1EB7880809A6E
                                    APIs
                                    • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014DF
                                    • GetProcAddress.KERNEL32(00000000), ref: 004014E6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: GetLastInputInfo$User32.dll
                                    • API String ID: 2574300362-1519888992
                                    • Opcode ID: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                                    • Instruction ID: 425bdc246283df71b7ad83aa0519e38d385401eab2b134f4ae8d574857069069
                                    • Opcode Fuzzy Hash: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                                    • Instruction Fuzzy Hash: D7B092B85843849BC7202BE0BC0DA297BA4FA48B43720447AF406D11A1EB7881809F6F
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __alldvrm$_strrchr
                                    • String ID:
                                    • API String ID: 1036877536-0
                                    • Opcode ID: fd79a7ba97117714d85021eba27869df20238d29c0b4b296cd839071043617be
                                    • Instruction ID: 63a095292c52d92af2bf19a392fdfa9b0d117a80b68c781492b1ecdde0b53e6f
                                    • Opcode Fuzzy Hash: fd79a7ba97117714d85021eba27869df20238d29c0b4b296cd839071043617be
                                    • Instruction Fuzzy Hash: 60A168729042469FFB21CF58C8817AEBBE2EF55314F24416FE5849B382DA3C8D45C759
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                                    • Instruction ID: 90b3d0a8f148eb65ba096d855dd205fb67a40d318d5acb0a54968c3478788488
                                    • Opcode Fuzzy Hash: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                                    • Instruction Fuzzy Hash: 10412B71A00744AFF724AF78CC41B6ABBE8EF88714F10452FF511DB291E679A9458788
                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                                    • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                                    • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                    • String ID:
                                    • API String ID: 3360349984-0
                                    • Opcode ID: e7efdc3c20157fe016eb29e5a130d6f8c33beeccd37b3f6c9988191ed4582187
                                    • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                                    • Opcode Fuzzy Hash: e7efdc3c20157fe016eb29e5a130d6f8c33beeccd37b3f6c9988191ed4582187
                                    • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A
                                    APIs
                                    Strings
                                    • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                                    • Cleared browsers logins and cookies., xrefs: 0040B8EF
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Sleep
                                    • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                    • API String ID: 3472027048-1236744412
                                    • Opcode ID: c1d9957bbb0b6ffbc53675b18bda7a9e9a83474d3c872a81f0d626b3d463543d
                                    • Instruction ID: 8ec9c8031b8ac0664cfb8a22ca307bf710261ddd843e88104a77dac6ce00e7b7
                                    • Opcode Fuzzy Hash: c1d9957bbb0b6ffbc53675b18bda7a9e9a83474d3c872a81f0d626b3d463543d
                                    • Instruction Fuzzy Hash: FA31891564C3816ACA11777514167EB6F958A93754F0884BFF8C4273E3DB7A480893EF
                                    APIs
                                      • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                      • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                      • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                                    • Sleep.KERNEL32(00000BB8), ref: 004115C3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpenQuerySleepValue
                                    • String ID: @CG$exepath$BG
                                    • API String ID: 4119054056-3221201242
                                    • Opcode ID: bf5574a8b4d2f3dae16cf885c7a16fb18bb29924f8325a853eaea5d7e5cb2135
                                    • Instruction ID: 48aadeccb903c06d46a934e3c92f1fe58b0119fffb77d403c20537554d94cb98
                                    • Opcode Fuzzy Hash: bf5574a8b4d2f3dae16cf885c7a16fb18bb29924f8325a853eaea5d7e5cb2135
                                    • Instruction Fuzzy Hash: C721F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DE7D9D4581AD
                                    APIs
                                      • Part of subcall function 0041B6E6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B6F6
                                      • Part of subcall function 0041B6E6: GetWindowTextLengthW.USER32(00000000), ref: 0041B6FF
                                      • Part of subcall function 0041B6E6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B729
                                    • Sleep.KERNEL32(000001F4), ref: 00409C95
                                    • Sleep.KERNEL32(00000064), ref: 00409D1F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Window$SleepText$ForegroundLength
                                    • String ID: [ $ ]
                                    • API String ID: 3309952895-93608704
                                    • Opcode ID: f97a645a0d2da22bcac442ef33f0edb303259d95a1ef08cf99aa338e08c2de75
                                    • Instruction ID: a5f4dc9a3e016f43683dc3f70dfd76a68f9d753ffdb665cb1c6be196efeb7d0c
                                    • Opcode Fuzzy Hash: f97a645a0d2da22bcac442ef33f0edb303259d95a1ef08cf99aa338e08c2de75
                                    • Instruction Fuzzy Hash: 4611C0325082005BD218FB25DC17AAEB7A8AF51708F40047FF542221E3EF39AE1986DF
                                    APIs
                                    • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5EB
                                    • WriteFile.KERNEL32(00000000,00000000,00000000,004061FD,00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5FF
                                    • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B60C
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateHandlePointerWrite
                                    • String ID:
                                    • API String ID: 3604237281-0
                                    • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                    • Instruction ID: 083799f3d1f95ebfb1fb2bbe8bc155d348f6fb5eb74ded268dd94cd43ec1eb57
                                    • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                    • Instruction Fuzzy Hash: 7501F5712092157FE6104F28AC89EBB739EEB86379F10063AF552C22C0D725CD8586BE
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bac99735e7dd953dd7de7a25bc7a472b089e844b0a047387f9cea53258e5f848
                                    • Instruction ID: c84c011be516b9a55b4d27d1f6be1bd7d35570b7e88518a67a440710abbdd315
                                    • Opcode Fuzzy Hash: bac99735e7dd953dd7de7a25bc7a472b089e844b0a047387f9cea53258e5f848
                                    • Instruction Fuzzy Hash: 780126F26097153EF62016796CC1F6B230CDF823B8B34073BF421652E1EAA8CC01506C
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48cf3eaabf7ece0113a3c008fb104be432a4ec3be30a454fc0a72fbc2683693e
                                    • Instruction ID: e6f180ecc181abb5a77ec057abe27f8575e00a75e8bcf6cd4df5c03139e47140
                                    • Opcode Fuzzy Hash: 48cf3eaabf7ece0113a3c008fb104be432a4ec3be30a454fc0a72fbc2683693e
                                    • Instruction Fuzzy Hash: E10121F2A092163EB62016797DD0DA7260DDF823B8374033BF421722D2EAA88C004068
                                    APIs
                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 0043810F
                                      • Part of subcall function 0043805C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043808B
                                      • Part of subcall function 0043805C: ___AdjustPointer.LIBCMT ref: 004380A6
                                    • _UnwindNestedFrames.LIBCMT ref: 00438124
                                    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438135
                                    • CallCatchBlock.LIBVCRUNTIME ref: 0043815D
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                    • String ID:
                                    • API String ID: 737400349-0
                                    • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                    • Instruction ID: 9a8277e88b86f5caaa8344fd0510e130f37262ecddc885b6c63592dc4fca678f
                                    • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                    • Instruction Fuzzy Hash: 09014032100208BBDF126E96CC45DEB7B69EF4C758F04500DFE4866121C739E861DBA8
                                    APIs
                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue), ref: 00447242
                                    • GetLastError.KERNEL32(?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446F91), ref: 0044724E
                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044725C
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryLoad$ErrorLast
                                    • String ID:
                                    • API String ID: 3177248105-0
                                    • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                    • Instruction ID: 998cab178f840ac2caaf283a3a5c141d85ba25b8fcaedc139a46ff50caeaa73b
                                    • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                    • Instruction Fuzzy Hash: FC01D83261D7236BD7214B79AC44A577798BB05BA1B1106B2F906E3241D768D802C6D8
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                                    • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B647
                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B66C
                                    • CloseHandle.KERNEL32(00000000,?,00000000,00403AF3,00465324), ref: 0041B67A
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateHandleReadSize
                                    • String ID:
                                    • API String ID: 3919263394-0
                                    • Opcode ID: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                                    • Instruction ID: 0a6fce4b3becde4f67ebc64a516323d43c368a538d14007d95c0a1c89629aad3
                                    • Opcode Fuzzy Hash: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                                    • Instruction Fuzzy Hash: B3F0F6B12053047FE6101B25FC85FBF375CDB867A5F00023EFC01A22D1DA658C459179
                                    APIs
                                    • GetSystemMetrics.USER32(0000004C), ref: 00418519
                                    • GetSystemMetrics.USER32(0000004D), ref: 0041851F
                                    • GetSystemMetrics.USER32(0000004E), ref: 00418525
                                    • GetSystemMetrics.USER32(0000004F), ref: 0041852B
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: MetricsSystem
                                    • String ID:
                                    • API String ID: 4116985748-0
                                    • Opcode ID: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                    • Instruction ID: 928f1b056b10b768f566869b0c9e39fed015f0adb742d9b99f9daccd71f82e50
                                    • Opcode Fuzzy Hash: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                    • Instruction Fuzzy Hash: 96F0D672B043216BCA00EA798C4556FBB97DFD02A4F25083FE6059B341DEB8EC4687D9
                                    APIs
                                    • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                    • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3D3
                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3DB
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandleOpenProcess
                                    • String ID:
                                    • API String ID: 39102293-0
                                    • Opcode ID: 51a17e5294b38f17d5f3a71b1001121c929f89ba237b4680bf25dfaaaa51ef0d
                                    • Instruction ID: bb9aee54fd4b55ef2446b45ef4d52834339351c189d8e7c886657dc3bd6b5f1d
                                    • Opcode Fuzzy Hash: 51a17e5294b38f17d5f3a71b1001121c929f89ba237b4680bf25dfaaaa51ef0d
                                    • Instruction Fuzzy Hash: 2FF04971204209ABD3106754AC4AFA7B27CDB40B96F000037FA61D22A1FFB4CCC146AE
                                    APIs
                                    • __startOneArgErrorHandling.LIBCMT ref: 00441F6D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorHandling__start
                                    • String ID: pow
                                    • API String ID: 3213639722-2276729525
                                    • Opcode ID: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                    • Instruction ID: c296867054112a427edbdd16b3baf579c6faf9d8481746a729c2ad46b2c40409
                                    • Opcode Fuzzy Hash: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                    • Instruction Fuzzy Hash: 2A517B61A1620196F7117714C98137F2BD0DB50741F688D6BF085423F9DF3D8CDA9A4E
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CountEventTick
                                    • String ID: >G
                                    • API String ID: 180926312-1296849874
                                    • Opcode ID: 1f5908ed609710af97071c3db883e6ab81da8cec775d61e1c1dd13d0f35e5354
                                    • Instruction ID: d5b3ec7783a4dd7183bbf31121b5a8e130ff38f85bff4fd723ced1f164cd3d8d
                                    • Opcode Fuzzy Hash: 1f5908ed609710af97071c3db883e6ab81da8cec775d61e1c1dd13d0f35e5354
                                    • Instruction Fuzzy Hash: 1A5170315042409AC624FB71D8A2AEF73A5AFD1314F40853FF94A671E2EF389949C69A
                                    APIs
                                    • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB59
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Info
                                    • String ID: $fD
                                    • API String ID: 1807457897-3092946448
                                    • Opcode ID: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                                    • Instruction ID: 070357306f4c5095a08430c9ceac02bf5c2973ae7142a422f036c1757655e3b4
                                    • Opcode Fuzzy Hash: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                                    • Instruction Fuzzy Hash: C241FA7090439C9AEB218F24CCC4BF6BBB9DF45308F1404EEE59A87242D279AE45DF65
                                    APIs
                                    • GetACP.KERNEL32(?,20001004,?,00000002), ref: 004509B9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: ACP$OCP
                                    • API String ID: 0-711371036
                                    • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                    • Instruction ID: 7e3e8aaac6bfe0b7539266298c93f9b0706a3ab6a9e9f394231f134d2b8bf5b7
                                    • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                    • Instruction Fuzzy Hash: 072138EAA04201A6F7348B558801B9B7396AF54B23F164826EC49D730BF739DD49C358
                                    APIs
                                    • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 004049F1
                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                    • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 00404A4E
                                    Strings
                                    • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LocalTime
                                    • String ID: KeepAlive | Enabled | Timeout:
                                    • API String ID: 481472006-1507639952
                                    • Opcode ID: 4fbf8cc4982cbc942d3db3f2afc9c4eacdcd9657b35503fb3d66e7a76927aef2
                                    • Instruction ID: fa495feba5854bec2644a8330ceabc5ae1d4c14ac10d4033695aa89a80f4fa5c
                                    • Opcode Fuzzy Hash: 4fbf8cc4982cbc942d3db3f2afc9c4eacdcd9657b35503fb3d66e7a76927aef2
                                    • Instruction Fuzzy Hash: 5A2126A1A042806BC310FB6AD80A76B7B9497D1319F44407EF849532E2DB3C5999CB9F
                                    APIs
                                    • GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LocalTime
                                    • String ID: | $%02i:%02i:%02i:%03i
                                    • API String ID: 481472006-2430845779
                                    • Opcode ID: 49072da793dd1067c8c4d4b952bdc095bcf71ad5a1237c39b773f575b27685be
                                    • Instruction ID: d205b4ebe2adc0156a37935a73d605e8b5d9817e81284f53efab16a15aec7ece
                                    • Opcode Fuzzy Hash: 49072da793dd1067c8c4d4b952bdc095bcf71ad5a1237c39b773f575b27685be
                                    • Instruction Fuzzy Hash: 80114C725082045AC704EBA5D8568AF73E8AB94708F10053FFC85931E1EF38DA84C69E
                                    APIs
                                    • PathFileExistsW.SHLWAPI(00000000), ref: 00419EAE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExistsFilePath
                                    • String ID: alarm.wav$xIG
                                    • API String ID: 1174141254-4080756945
                                    • Opcode ID: a83789ed06d4bd6bc78d9f5caa1c4ae1948ed669f67617dd6d77616b3b752c21
                                    • Instruction ID: 7a4fe07350b1461b8d7cab7706a536354aa1130be6e3c83a2e6414618e768e61
                                    • Opcode Fuzzy Hash: a83789ed06d4bd6bc78d9f5caa1c4ae1948ed669f67617dd6d77616b3b752c21
                                    • Instruction Fuzzy Hash: 8B01802060420166C604B676D866AEE77458BC1719F40413FF89A966E2EF6CAEC6C2DF
                                    APIs
                                      • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                      • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                      • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                    • CloseHandle.KERNEL32(?), ref: 0040A7CA
                                    • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                    • String ID: Online Keylogger Stopped
                                    • API String ID: 1623830855-1496645233
                                    • Opcode ID: a471bc76fffd1fbac32a3585e4c4fab67e2de2ee53134a9f9046e82175b62acd
                                    • Instruction ID: 3c154674506c802d119dc10506b29c5389a087cae46ba36945c53301bfe6088f
                                    • Opcode Fuzzy Hash: a471bc76fffd1fbac32a3585e4c4fab67e2de2ee53134a9f9046e82175b62acd
                                    • Instruction Fuzzy Hash: CC01D431A043019BDB25BB35C80B7AEBBB59B45315F80407FE481225D2EB7999A6C3DB
                                    APIs
                                    • waveInPrepareHeader.WINMM(?,00000020,?,?,00000000,00475B70,00473EE8,?,00000000,00401913), ref: 00401747
                                    • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401913), ref: 0040175D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: wave$BufferHeaderPrepare
                                    • String ID: T=G
                                    • API String ID: 2315374483-379896819
                                    • Opcode ID: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                                    • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                                    • Opcode Fuzzy Hash: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                                    • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                                    APIs
                                    • IsValidLocale.KERNEL32(00000000,j=D,00000000,00000001,?,?,00443D6A,?,?,?,?,00000004), ref: 004477DC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LocaleValid
                                    • String ID: IsValidLocaleName$j=D
                                    • API String ID: 1901932003-3128777819
                                    • Opcode ID: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                    • Instruction ID: d075984350fdfa8650c9f53b231b8a0b142c4dacf6ed37e79753978632a381d4
                                    • Opcode Fuzzy Hash: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                    • Instruction Fuzzy Hash: B7F0E930A45218F7EA116B61DC06F5EBB54CF49B11F50407AFD056A293CB796D0195DC
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: H_prolog
                                    • String ID: T=G$T=G
                                    • API String ID: 3519838083-3732185208
                                    • Opcode ID: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                    • Instruction ID: 37a3980bbf64332544f5ef03d086655580814226aad47650f393c0c18fea351b
                                    • Opcode Fuzzy Hash: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                    • Instruction Fuzzy Hash: BCF0E971A00220ABC714BB65C80669EB774EF41369F10827FB416B72E1CBBD5D04D65D
                                    APIs
                                    • GetKeyState.USER32(00000011), ref: 0040AD5B
                                      • Part of subcall function 00409B10: GetForegroundWindow.USER32 ref: 00409B3F
                                      • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                      • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                      • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                      • Part of subcall function 00409B10: GetKeyboardState.USER32(?), ref: 00409B67
                                      • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                      • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                      • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                    • String ID: [AltL]$[AltR]
                                    • API String ID: 2738857842-2658077756
                                    • Opcode ID: 2d4b77a5ab42310f07ca9c8b3da7c02f816ae55a84891d8b572aa7cd1e2c76fb
                                    • Instruction ID: d2c0c429c9fe13b3c6c970781ecfc4970ab7400740a1dec538c1fc9fef0a0b20
                                    • Opcode Fuzzy Hash: 2d4b77a5ab42310f07ca9c8b3da7c02f816ae55a84891d8b572aa7cd1e2c76fb
                                    • Instruction Fuzzy Hash: 47E0652134072117C898323EA91E6EE3A228F82B65B80416FF8866BAD6DD6D4D5053CB
                                    APIs
                                    • _free.LIBCMT ref: 00448825
                                      • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                      • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorFreeHeapLast_free
                                    • String ID: `@$`@
                                    • API String ID: 1353095263-20545824
                                    • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                    • Instruction ID: 46705ffcfacdd7a720b29fb61e5cb4af2d59a6418439a2947ca99394172970e0
                                    • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                    • Instruction Fuzzy Hash: B9E06D761006059F8720DE6DD400A86B7E4EF95360320852AE89DE3310DB32E812CB40
                                    APIs
                                    • GetKeyState.USER32(00000012), ref: 0040ADB5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: State
                                    • String ID: [CtrlL]$[CtrlR]
                                    • API String ID: 1649606143-2446555240
                                    • Opcode ID: b832f2ba8c23f1ed675ed1d8fb8a36e3adfa50d2a3dfff7a7859d4c0b25c7229
                                    • Instruction ID: 615b7dbe40c0b8188db9493e0f2b19f017fb36a74fa458c508a435569d7d4a1e
                                    • Opcode Fuzzy Hash: b832f2ba8c23f1ed675ed1d8fb8a36e3adfa50d2a3dfff7a7859d4c0b25c7229
                                    • Instruction Fuzzy Hash: 71E0862170071117C514353DD61A67F39228F41776F80013FF882ABAC6E96D8D6023CB
                                    APIs
                                    • RegOpenKeyExW.ADVAPI32(80000001,00000000,00000000,00000002,00000000,80000001,J@4fF,00412951,00000000,00000000,J@4fF,?,00000000), ref: 00412988
                                    • RegDeleteValueW.ADVAPI32(00000000,?,?,00000000), ref: 00412998
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DeleteOpenValue
                                    • String ID: J@4fF
                                    • API String ID: 2654517830-1060276034
                                    • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                    • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                                    • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                    • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                                    APIs
                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FAF4
                                    • GetLastError.KERNEL32 ref: 0043FB02
                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FB5D
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1714038112.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_400000_ORDER AND SPECIFICATIONS.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharMultiWide$ErrorLast
                                    • String ID:
                                    • API String ID: 1717984340-0
                                    • Opcode ID: 3f0ff04a5dcf7e8fd5b137fcdb20dceab511bd439b95d46b3d550210e9ecb368
                                    • Instruction ID: ecac45699e256c48587d6f27f66036641a8fb520bb473c9b2adecd150689d728
                                    • Opcode Fuzzy Hash: 3f0ff04a5dcf7e8fd5b137fcdb20dceab511bd439b95d46b3d550210e9ecb368
                                    • Instruction Fuzzy Hash: 65414871E00206AFCF258F65C854ABBFBA4EF09310F1451BAF858973A1DB38AD09C759

                                    Execution Graph

                                    Execution Coverage:6.2%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:38
                                    Total number of Limit Nodes:3
                                    execution_graph 29670 166cfe0 29671 166d026 29670->29671 29675 166d5c8 29671->29675 29678 166d5b8 29671->29678 29672 166d113 29681 166d21c 29675->29681 29679 166d5f6 29678->29679 29680 166d21c DuplicateHandle 29678->29680 29679->29672 29680->29679 29682 166d630 DuplicateHandle 29681->29682 29683 166d5f6 29682->29683 29683->29672 29712 166ac50 29715 166ad48 29712->29715 29713 166ac5f 29716 166ad59 29715->29716 29717 166ad7c 29715->29717 29716->29717 29718 166af80 GetModuleHandleW 29716->29718 29717->29713 29719 166afad 29718->29719 29719->29713 29684 5b26af8 29685 5b26c83 29684->29685 29687 5b26b1e 29684->29687 29687->29685 29688 5b22ce0 29687->29688 29689 5b26d78 PostMessageW 29688->29689 29690 5b26de4 29689->29690 29690->29687 29691 1664668 29692 166467a 29691->29692 29693 1664686 29692->29693 29695 1664779 29692->29695 29696 166479d 29695->29696 29700 1664888 29696->29700 29704 1664879 29696->29704 29702 16648af 29700->29702 29701 166498c 29702->29701 29708 16644b0 29702->29708 29706 1664888 29704->29706 29705 166498c 29705->29705 29706->29705 29707 16644b0 CreateActCtxA 29706->29707 29707->29705 29709 1665918 CreateActCtxA 29708->29709 29711 16659db 29709->29711

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 475 6132106-613210a 476 613210b-6132120 475->476 477 6132acd-6132adf 475->477 476->477 478 6132121-613212c 476->478 480 6132132-613213e 478->480 481 613214a-6132159 480->481 483 61321b8-61321bc 481->483 484 61321c2-61321cb 483->484 485 6132264-61322ce 483->485 486 61321d1-61321e7 484->486 487 61320c6-61320d2 484->487 485->477 523 61322d4-613281b 485->523 493 6132239-613224b 486->493 494 61321e9-61321ec 486->494 487->477 489 61320d8-61320e4 487->489 491 61320e6-61320fa 489->491 492 613215b-6132161 489->492 491->492 502 61320fc-6132105 491->502 492->477 495 6132167-613217f 492->495 503 6132251-6132261 493->503 504 6132a0c-6132ac2 493->504 494->477 497 61321f2-613222f 494->497 495->477 506 6132185-61321ad 495->506 497->485 519 6132231-6132237 497->519 502->475 504->477 506->483 519->493 519->494 601 6132832-61328c5 523->601 602 613281d-6132827 523->602 603 61328d0-6132963 601->603 602->603 604 613282d 602->604 605 613296e-6132a01 603->605 604->605 605->504
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: D
                                    • API String ID: 0-2746444292
                                    • Opcode ID: e21cd408ce533921f52f9ee57145c3349474f268e945aaf690f0184bd602ceec
                                    • Instruction ID: fea70bcb46461f254de0d146033e77acae51c1f3ff0b2c12784c099a4c86c863
                                    • Opcode Fuzzy Hash: e21cd408ce533921f52f9ee57145c3349474f268e945aaf690f0184bd602ceec
                                    • Instruction Fuzzy Hash: 5252BA74A002298FDB64DF68C998A9DBBB6FF89300F1045D9D509A73A4CF35AE81CF51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 294 6132c38-6132c4a 295 6132c53-6132c5f 294->295 296 6132c4c-6132c4e 294->296 299 6132c61-6132c63 295->299 300 6132c68-6132c7d 295->300 297 6132d26-6132d2b 296->297 299->297 303 6132c91-6132c9d 300->303 304 6132c7f-6132c8a 300->304 307 6132caa-6132cac 303->307 308 6132c9f-6132ca8 303->308 304->303 309 6132cae-6132cba 307->309 310 6132cbc-6132cc0 307->310 308->307 309->310 315 6132cd2-6132cdc 309->315 312 6132cc2-6132ccc 310->312 313 6132cce-6132cd0 310->313 317 6132d38-6132d44 312->317 313->297 320 6132cde-6132cea 315->320 321 6132d2c-6132d36 315->321 322 6132d51-6132d53 317->322 323 6132d46-6132d4f 317->323 326 6132cfc-6132cfe 320->326 327 6132cec-6132cfa 320->327 321->317 322->297 323->297 326->297 327->326 330 6132d00-6132d06 327->330 331 6132d0a 330->331 332 6132d08 330->332 333 6132d0c-6132d0e 331->333 332->333 334 6132d10-6132d1c 333->334 335 6132d55-6132de1 333->335 334->335 338 6132d1e 334->338 348 6132de3-6132ded 335->348 349 6132def-6132e0b 335->349 338->297 348->349 352 6132e28-6132e3c 348->352 354 6132e23-6132e25 349->354 355 6132e0d-6132e21 349->355 359 6132e43-6132e79 352->359 355->354 355->359 364 6132e7f-6132e91 359->364 365 6132f4e-6132f51 359->365 367 6132e93-6132e96 364->367 368 6132ea6-6132ea9 364->368 369 6132f1b-6132f21 367->369 370 6132e9c-6132e9f 367->370 371 6132eab-6132eae 368->371 372 6132eb9-6132ebf 368->372 375 6132f23-6132f25 369->375 376 6132f27-6132f33 369->376 379 6132ea1 370->379 380 6132eea-6132ef0 370->380 373 6132eb4 371->373 374 6132f4a-6132f4c 371->374 377 6132ec1-6132ec3 372->377 378 6132ec5-6132ed1 372->378 373->374 374->365 383 6132f52-6132fe5 374->383 381 6132f35-6132f48 375->381 376->381 382 6132ed3-6132ee8 377->382 378->382 379->374 384 6132ef2-6132ef4 380->384 385 6132ef6-6132f02 380->385 381->374 382->374 401 6132fe7 383->401 402 6132fec-6133000 383->402 388 6132f04-6132f19 384->388 385->388 388->374 401->402 403 6133006-613300b 402->403 404 61330f4-61330fb 402->404 405 6133011-6133016 403->405 406 61330c6 403->406 404->403 407 6133100 405->407 408 613301c-613301d 405->408 438 61330c9 call 613b970 406->438 439 61330c9 call 613b980 406->439 445 6133100 call 61332d0 407->445 446 6133100 call 61332c0 407->446 440 6133020 call 6133d21 408->440 441 6133020 call 6133d30 408->441 442 6133020 call 6133d9e 408->442 410 61330cf-61330da 418 61330e3 410->418 419 61330dc-61330e0 410->419 411 6133026-6133033 413 6133039-613303d 411->413 414 613310c-6133113 411->414 412 6133106-6133107 412->408 416 6133043-613305b 413->416 417 6133118-613311f 413->417 414->413 425 6133061-6133064 416->425 426 6133124-613312b 416->426 417->416 447 61330e3 call 5b26a90 418->447 448 61330e3 call 5b26a80 418->448 420 61330e2 419->420 421 6133086-6133087 419->421 420->418 449 613308a call 6139f10 421->449 450 613308a call 6139f00 421->450 424 61330e9-61330f1 436 6133067 call 61347b9 425->436 437 6133067 call 61347c8 425->437 426->425 427 6133090-613309c 434 613309f call 613b298 427->434 435 613309f call 613b288 427->435 428 61330a5-61330b2 428->418 430 61330b4 428->430 429 613306d-613307a 431 6133130-6133137 429->431 432 6133080 429->432 443 61330b7 call 613b850 430->443 444 61330b7 call 613b840 430->444 431->432 432->421 433 61330bd-61330c3 433->406 434->428 435->428 436->429 437->429 438->410 439->410 440->411 441->411 442->411 443->433 444->433 445->412 446->412 447->424 448->424 449->427 450->427
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'^q$4'^q$4'^q$4|cq$4|cq$$^q
                                    • API String ID: 0-1027864050
                                    • Opcode ID: 59dc50087a5c181cb7c4c66efdfe7d2770ef6a9a8d3c620f808f91eb18ba6068
                                    • Instruction ID: b590bac265c119fe744faa84b1da176fc15feb1bb8c74bd9d4b104c5163360ee
                                    • Opcode Fuzzy Hash: 59dc50087a5c181cb7c4c66efdfe7d2770ef6a9a8d3c620f808f91eb18ba6068
                                    • Instruction Fuzzy Hash: 83E1DE30B002258FDB69EF79D85866E7BE6BF89600B158869E407DB3A0DF30DD41CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 630 166ad48-166ad57 631 166ad83-166ad87 630->631 632 166ad59-166ad66 call 166a06c 630->632 634 166ad9b-166addc 631->634 635 166ad89-166ad93 631->635 638 166ad7c 632->638 639 166ad68 632->639 641 166adde-166ade6 634->641 642 166ade9-166adf7 634->642 635->634 638->631 686 166ad6e call 166afe0 639->686 687 166ad6e call 166afd0 639->687 641->642 643 166ae1b-166ae1d 642->643 644 166adf9-166adfe 642->644 649 166ae20-166ae27 643->649 646 166ae00-166ae07 call 166a078 644->646 647 166ae09 644->647 645 166ad74-166ad76 645->638 648 166aeb8-166af78 645->648 651 166ae0b-166ae19 646->651 647->651 681 166af80-166afab GetModuleHandleW 648->681 682 166af7a-166af7d 648->682 652 166ae34-166ae3b 649->652 653 166ae29-166ae31 649->653 651->649 656 166ae3d-166ae45 652->656 657 166ae48-166ae51 call 166a088 652->657 653->652 656->657 661 166ae53-166ae5b 657->661 662 166ae5e-166ae63 657->662 661->662 663 166ae65-166ae6c 662->663 664 166ae81-166ae85 662->664 663->664 666 166ae6e-166ae7e call 166a098 call 166a0a8 663->666 669 166ae8b-166ae8e 664->669 666->664 671 166ae90-166aeae 669->671 672 166aeb1-166aeb7 669->672 671->672 683 166afb4-166afc8 681->683 684 166afad-166afb3 681->684 682->681 684->683 686->645 687->645
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0166AF9E
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1741924193.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_1660000_remcos.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 0137cb57f2250494f144957f7fa5f6ed2cad72288cf42390e3a6501ffb3e6af5
                                    • Instruction ID: 26dc6ed31ef50c6acca9611a1d6b8837a2f2948643f0aaeebca0af00b7672270
                                    • Opcode Fuzzy Hash: 0137cb57f2250494f144957f7fa5f6ed2cad72288cf42390e3a6501ffb3e6af5
                                    • Instruction Fuzzy Hash: 96714470A00B059FD724DF6AD85475ABBF5BF88304F108A2DD48AE7B50DB75E849CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 688 16644b0-16659d9 CreateActCtxA 691 16659e2-1665a3c 688->691 692 16659db-16659e1 688->692 699 1665a3e-1665a41 691->699 700 1665a4b-1665a4f 691->700 692->691 699->700 701 1665a60 700->701 702 1665a51-1665a5d 700->702 704 1665a61 701->704 702->701 704->704
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 016659C9
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1741924193.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_1660000_remcos.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 636a82fa6fdc5097bcf4dba9e9ebd608f2ca7a976fd4db9c8c1cc568895d2733
                                    • Instruction ID: 7ade0d26b98759dfbdd5a258f74662132b9b2c5f75c6ed8b6b318d5472810e5b
                                    • Opcode Fuzzy Hash: 636a82fa6fdc5097bcf4dba9e9ebd608f2ca7a976fd4db9c8c1cc568895d2733
                                    • Instruction Fuzzy Hash: B941F2B0C0071DCBDB24DFA9C885B9EBBF5BF49304F24806AD409AB255DB756946CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 705 166590c-1665914 706 166591c-16659d9 CreateActCtxA 705->706 708 16659e2-1665a3c 706->708 709 16659db-16659e1 706->709 716 1665a3e-1665a41 708->716 717 1665a4b-1665a4f 708->717 709->708 716->717 718 1665a60 717->718 719 1665a51-1665a5d 717->719 721 1665a61 718->721 719->718 721->721
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 016659C9
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1741924193.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_1660000_remcos.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: b619fbb1752050745ff1c344b7a21ab3b8164482a17cb9e49369192f863fd099
                                    • Instruction ID: d2a3da1e5c87b502e968ef76f382c3a806a2f59b6a4bf12bbde2d304fd331e52
                                    • Opcode Fuzzy Hash: b619fbb1752050745ff1c344b7a21ab3b8164482a17cb9e49369192f863fd099
                                    • Instruction Fuzzy Hash: FD4110B1C00719CFDB24DFA9C8857CEBBB5BF48304F24805AD409AB250DB756986CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 722 166d21c-166d6c4 DuplicateHandle 724 166d6c6-166d6cc 722->724 725 166d6cd-166d6ea 722->725 724->725
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0166D5F6,?,?,?,?,?), ref: 0166D6B7
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1741924193.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_1660000_remcos.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 0dc0a30e2cb9dfe812aef583e139e7cbb09e262c3ee767bfd0e8872f95ff797c
                                    • Instruction ID: 8f6e8360fb5bb0c4b1b6fdda1980f04ef962aad9921432e7d91b55044eccc06e
                                    • Opcode Fuzzy Hash: 0dc0a30e2cb9dfe812aef583e139e7cbb09e262c3ee767bfd0e8872f95ff797c
                                    • Instruction Fuzzy Hash: B421E3B5900258AFDB10CF9AD984AEEFBF8EB48310F14841AE958A7350D374A954CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 728 166d628-166d62b 729 166d630-166d6c4 DuplicateHandle 728->729 730 166d6c6-166d6cc 729->730 731 166d6cd-166d6ea 729->731 730->731
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0166D5F6,?,?,?,?,?), ref: 0166D6B7
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1741924193.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_1660000_remcos.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 4d4120561bff1f5e8c82a50778228ad384b77eed662f5723c52a7be0068171ff
                                    • Instruction ID: 129b1dd0dba8d9463ebe777b1075939707b8d5e46b1d2a9fc7d2bf2522b498d9
                                    • Opcode Fuzzy Hash: 4d4120561bff1f5e8c82a50778228ad384b77eed662f5723c52a7be0068171ff
                                    • Instruction Fuzzy Hash: 7021E3B5900258AFDB10CF9AD984ADEBBF9EB48324F14801AE958A7350D374A940CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 734 5b26e08-5b26e0c 735 5b26e0e-5b26e3d 734->735 736 5b26dcc-5b26de2 PostMessageW 734->736 737 5b26e44-5b26e57 735->737 738 5b26e3f 735->738 740 5b26de4-5b26dea 736->740 741 5b26deb-5b26dff 736->741 743 5b26e68-5b26e83 737->743 744 5b26e59-5b26e66 737->744 738->737 740->741 748 5b26e85 743->748 749 5b26e8d 743->749 744->743 748->749 750 5b26e8e 749->750 750->750
                                    APIs
                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 05B26DD5
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754486970.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_5b20000_remcos.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: 5de046c83f49c1ce756bb443e813b125a0bb85714e55ff6ab4ee0ca320a61418
                                    • Instruction ID: 2d6632cc6018bf35385f344cdc679ce5d096bb7139d74c7f811f5c210d78869a
                                    • Opcode Fuzzy Hash: 5de046c83f49c1ce756bb443e813b125a0bb85714e55ff6ab4ee0ca320a61418
                                    • Instruction Fuzzy Hash: 2311D376E04238CBDB20EFA4D5193EEBBF1AF48310F148899C859B7294CB756900CBB0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 751 6135597-6135598 752 613559a-61355de 751->752 753 613551d-6135527 751->753 754 61359a0-61359a6 752->754 755 61355e4-6135619 752->755 764 6135d18-6135d26 call 613552c 753->764 758 61359ac-61359c1 754->758 757 613561f-613563d 755->757 755->758 759 6135644-6135649 757->759 760 613563f 757->760 762 61359c9-61359cf 758->762 763 613564c-6135656 759->763 760->759 767 61359d5-61359de 762->767 763->762 765 613565c-6135663 763->765 768 6135665-613567e 765->768 769 613569b-61356ac 765->769 773 61359e4-6135a02 767->773 768->767 771 6135684-6135688 768->771 769->763 772 61356ae-61356b9 769->772 774 6135808-6135958 771->774 775 613568e-613569a 771->775 776 6135761-613576b 772->776 777 61356bf-61356c6 772->777 779 6135a0d-6135a13 773->779 807 613595a-613595d 774->807 808 6135969-613599f 774->808 778 6135771-6135772 776->778 776->779 780 6135777-6135799 777->780 781 61356cc-61356d9 777->781 778->774 779->764 783 61357a0-61357aa 780->783 784 613579b 780->784 785 61356e0-6135707 781->785 786 61357ad-61357ce 783->786 784->783 785->773 787 613570d-6135743 785->787 789 61357d0 786->789 790 61357d5-61357eb 786->790 791 6135745 787->791 792 613574a-6135756 787->792 789->790 794 61357f2-6135800 790->794 795 61357ed 790->795 791->792 792->785 793 6135758-613575e 792->793 793->776 794->786 797 6135802-6135805 794->797 795->794 797->774 807->808
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @
                                    • API String ID: 0-2766056989
                                    • Opcode ID: ef571f7711d3c2b0bf6991715b50f5b5ff997ccf85a6f27c5569e21b397a106b
                                    • Instruction ID: 0e08761d992282d2c10520ed0cfd6dc14f105420d0d82738073e7aad24e609f8
                                    • Opcode Fuzzy Hash: ef571f7711d3c2b0bf6991715b50f5b5ff997ccf85a6f27c5569e21b397a106b
                                    • Instruction Fuzzy Hash: 45E194B8E00228CFDB50DFA9C990A9DBBF2FB49314F5481AAD819E7355D730A985CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 810 166af38-166af78 811 166af80-166afab GetModuleHandleW 810->811 812 166af7a-166af7d 810->812 813 166afb4-166afc8 811->813 814 166afad-166afb3 811->814 812->811 814->813
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0166AF9E
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1741924193.0000000001660000.00000040.00000800.00020000.00000000.sdmp, Offset: 01660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_1660000_remcos.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: c46273c440ab93c28b3d44f8110671ff56518e7b63e3ae356e82f5bc306d1e27
                                    • Instruction ID: 935ae67fc150996e8d66468dd1387c574514fb864fe38d86429f97bfe85fc48a
                                    • Opcode Fuzzy Hash: c46273c440ab93c28b3d44f8110671ff56518e7b63e3ae356e82f5bc306d1e27
                                    • Instruction Fuzzy Hash: 0111E0B5C003498FDB14CF9AD844ADEFBF8AB88324F14842AD969B7350C379A545CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 816 5b22ce0-5b26de2 PostMessageW 818 5b26de4-5b26dea 816->818 819 5b26deb-5b26dff 816->819 818->819
                                    APIs
                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 05B26DD5
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754486970.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_5b20000_remcos.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: 23df949ecb6c1772bd18dd8bf558781a7869fcf1ed7bb650cfbc0728b6fd9a8a
                                    • Instruction ID: c1ec6fd0ae1f44aaabf794d7e635fa9be259a97933beffffb4b1b1352ee0f2e9
                                    • Opcode Fuzzy Hash: 23df949ecb6c1772bd18dd8bf558781a7869fcf1ed7bb650cfbc0728b6fd9a8a
                                    • Instruction Fuzzy Hash: D311F2B580035C9FCB20DF9AC589BEEFBF8EB48324F108459E559A7200C375A944CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 821 5b26d71-5b26de2 PostMessageW 822 5b26de4-5b26dea 821->822 823 5b26deb-5b26dff 821->823 822->823
                                    APIs
                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 05B26DD5
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754486970.0000000005B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_5b20000_remcos.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: 7fdfea9d1c8298d57f972fc4b2a72b0b136d41f5ce0f7dcce1cbec774a349cc9
                                    • Instruction ID: dfb9aca1abc76f8996fcd58de2bd25669559e6c08f2b29dc7d06a2259737cee7
                                    • Opcode Fuzzy Hash: 7fdfea9d1c8298d57f972fc4b2a72b0b136d41f5ce0f7dcce1cbec774a349cc9
                                    • Instruction Fuzzy Hash: 671103B6800358DFDB10DF99C549BDEBBF4EB48320F24845AD558B7200C374A944CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 825 6133d9e-6133d9f 826 6133da1-6133dba 825->826 827 6133d2c-6133d48 825->827 828 6133dc1-6133dde 826->828 829 6133dbc 826->829 830 6133d4a 827->830 831 6133d4f-6133d58 call 6133d9e 827->831 832 6133de1-6133de5 828->832 829->828 830->831 833 6133d5e-6133d6c 831->833 834 6133e75-6133ead 832->834 835 6133deb-6133df0 832->835 836 6133d78-6133d7f 833->836 837 6133d6e-6133d77 833->837 843 6133eb3-6133ee7 834->843 844 6133ff1-6133ff7 834->844 835->832 838 6133df2-6133e12 835->838 836->837 845 6133e17 838->845 847 6133ffd-6134003 843->847 852 6133eed-6133f2f 843->852 844->847 846 6133e1a-6133e46 845->846 855 6133fd9-6133fdf 846->855 856 6133e4c-6133e4e 846->856 851 6134009-6134010 847->851 854 6133f35-6133f46 851->854 852->851 852->854 857 6133e51-6133e5b 854->857 858 6133f4c-6133f8e 854->858 861 6133fe5-6133feb 855->861 856->857 857->846 860 6133e5d-6133e68 857->860 866 6134015-613401d 858->866 867 6133f94-6133f98 858->867 860->861 862 6133e6e-6133e6f 860->862 861->844 862->854 866->867 868 6133e74 867->868 869 6133f9e-6133fd8 867->869 868->834
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: LR^q
                                    • API String ID: 0-2625958711
                                    • Opcode ID: 1b303abd4eac40cb866e4a33bdfd6add905fa32716f33274280196348a158eaa
                                    • Instruction ID: 6562bc20e922cc7ca45cf317480b1e5e16f099a19abc1d4f81c96e037a40d577
                                    • Opcode Fuzzy Hash: 1b303abd4eac40cb866e4a33bdfd6add905fa32716f33274280196348a158eaa
                                    • Instruction Fuzzy Hash: 0691E678E042688FDB54DFA9C4806EDBBF2EF89314F208529D82AE7354D731A946CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Te^q
                                    • API String ID: 0-671973202
                                    • Opcode ID: c57f89614c1215f697c144c01ab46a42019a34488c2b7425ad82f4d464147681
                                    • Instruction ID: d1fa2b6283ff325c258bebdee3b5a4b1b9acbfde624523cbcc0561a3d418490d
                                    • Opcode Fuzzy Hash: c57f89614c1215f697c144c01ab46a42019a34488c2b7425ad82f4d464147681
                                    • Instruction Fuzzy Hash: 9451B171B002168FCB55DF79D8889AEBBF6FFC4224B148969E41ADB391EF309C058790
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: r
                                    • API String ID: 0-1812594589
                                    • Opcode ID: 95a9273211a0f58a3b3a6e555af32da32caa3fc6467679297ae067bf39d4f653
                                    • Instruction ID: 87b510307df92e16a21e4713ee82219638b87d2c9f17c9c3a37ca7658b828c2c
                                    • Opcode Fuzzy Hash: 95a9273211a0f58a3b3a6e555af32da32caa3fc6467679297ae067bf39d4f653
                                    • Instruction Fuzzy Hash: 16414B74D05228DFDB48CFAAE4449EDBBBAFF8D301F019469E406AB215CB309942CF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 8bq
                                    • API String ID: 0-187764589
                                    • Opcode ID: e7c10bda84f458cfa72391da6c95ce5a4a4550b440b35489326ea10c732a29f3
                                    • Instruction ID: ca9e315fd46df4b0dcb754697e41ed37b84e7f4dbd218b7160aad09a55ee5cd3
                                    • Opcode Fuzzy Hash: e7c10bda84f458cfa72391da6c95ce5a4a4550b440b35489326ea10c732a29f3
                                    • Instruction Fuzzy Hash: 3E411578E01229DFDB44DFA9D5809ADBBF2FB88310F108469E916E7350DB31A946CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Te^q
                                    • API String ID: 0-671973202
                                    • Opcode ID: 539f328183f583bbec2593d7458fc6a4875e0f542ad979f5cbc272db0a0026e3
                                    • Instruction ID: 74081e74f2d78442af17440880ac460916003a90afe77174121f6faf5ff8dc74
                                    • Opcode Fuzzy Hash: 539f328183f583bbec2593d7458fc6a4875e0f542ad979f5cbc272db0a0026e3
                                    • Instruction Fuzzy Hash: 2741DD74E05319CFEB48DFAAD9446EEBBF6BF89300F10942AD41AAB354DB705905CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: phU
                                    • API String ID: 0-496366998
                                    • Opcode ID: ff32ac9a0981cafe5f5cc0871ca46a587e472f2185820e8b70e724712ea6f4c0
                                    • Instruction ID: 96a39b4bad0dd311eadc196fc5c50501d0593b9e20eaca42fbf8bab23b9825d5
                                    • Opcode Fuzzy Hash: ff32ac9a0981cafe5f5cc0871ca46a587e472f2185820e8b70e724712ea6f4c0
                                    • Instruction Fuzzy Hash: 3D41D2B1D002189BDB64DFA9C584A9DFBB5AF48304F248429E409BB214D775AA86CF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: phU
                                    • API String ID: 0-496366998
                                    • Opcode ID: c843c1b1c384b272c16613154da1802f05d6a0cd9fc8abeb6d0d2bcb147c0461
                                    • Instruction ID: 332cd34cad69cd58ccd5564ef1217de7a56b9d3d0681084de7fa09eae045a611
                                    • Opcode Fuzzy Hash: c843c1b1c384b272c16613154da1802f05d6a0cd9fc8abeb6d0d2bcb147c0461
                                    • Instruction Fuzzy Hash: 9B41E2B1D002189BDB54CFA9C984ADDBFB5AF48304F248419E409BB255D775AA86CF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 8bq
                                    • API String ID: 0-187764589
                                    • Opcode ID: d9e9115dfe72d1f0972b2fb8dedb875db64c6a17d081f7aebd41500aa96638bd
                                    • Instruction ID: d89e1af7240b1c82831359f07ed14c837219e592a435ee326c8fdb03202e0072
                                    • Opcode Fuzzy Hash: d9e9115dfe72d1f0972b2fb8dedb875db64c6a17d081f7aebd41500aa96638bd
                                    • Instruction Fuzzy Hash: B4410874E00119DFDB44DFA9D9906AEBBF2FB89314F108469E816F7350DB31A946CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: phU
                                    • API String ID: 0-496366998
                                    • Opcode ID: 93b75d5eb1d776c8cf43cdc30f2487575c2b5912af1db3783cced13e0cf1a976
                                    • Instruction ID: e49aa2167800822df5f4eaa7fd6ab07e46ab5a2f787babedb6ad924198e705b2
                                    • Opcode Fuzzy Hash: 93b75d5eb1d776c8cf43cdc30f2487575c2b5912af1db3783cced13e0cf1a976
                                    • Instruction Fuzzy Hash: B021A171A002158FC750EF79C84859ABBE6EF85214B18C9A9E50BDB351EF71EC0ACB91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: phU
                                    • API String ID: 0-496366998
                                    • Opcode ID: 5daee835c55ec73a72991af2269120ae5f74839b24ef0876f0e2d6076f2936e4
                                    • Instruction ID: a798f2aacfd59f3f86e097497da47d9223a8218637ebcc5592f446a6a0265e9c
                                    • Opcode Fuzzy Hash: 5daee835c55ec73a72991af2269120ae5f74839b24ef0876f0e2d6076f2936e4
                                    • Instruction Fuzzy Hash: 66117271A006158FC750EB79C9045DABBE6FF84214B048AA9D55BDB3A0EF70ED09CB91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Te^q
                                    • API String ID: 0-671973202
                                    • Opcode ID: beed405b7f39cba356178ce8fa62859c992daa1179a8fa340883ebc39fc06c10
                                    • Instruction ID: 2a8ffab1f895ac2aba5dd113c319050434e52086a38cc1689072d63a0b41e866
                                    • Opcode Fuzzy Hash: beed405b7f39cba356178ce8fa62859c992daa1179a8fa340883ebc39fc06c10
                                    • Instruction Fuzzy Hash: 71112131F0025A8BCB54EBB9D9145EFB6F7AFD4610B50446AC506EB244EB319D06CB91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 6
                                    • API String ID: 0-498629140
                                    • Opcode ID: 7d67dfc5aa905113efc5d385e52d1c94ae3ac8bc8dcd86b4bee2651a5a04153f
                                    • Instruction ID: 7f41be78062918bf5380b0e39f4ca2ec15798b07a1b808bffa7c4749a97b9f21
                                    • Opcode Fuzzy Hash: 7d67dfc5aa905113efc5d385e52d1c94ae3ac8bc8dcd86b4bee2651a5a04153f
                                    • Instruction Fuzzy Hash: B0E0C230D0520CEBEB64DFB4D5092ADBFB89B09302F10C094E80793280EF305B44D685
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: phU
                                    • API String ID: 0-496366998
                                    • Opcode ID: 066894785301f2caa96a707b331e72233f7929f801ade0e2c0a450d47c19b559
                                    • Instruction ID: b640bb9aaae2ce4fe92ce98bd32425de7e074baf05cd5db339ec3a2ba7695641
                                    • Opcode Fuzzy Hash: 066894785301f2caa96a707b331e72233f7929f801ade0e2c0a450d47c19b559
                                    • Instruction Fuzzy Hash: FAD0123215411C5E8BC0EF94EC00C5677DCBF68740B408422E548C7020E722E474D751
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b886999267e71080994d778d494b7a578643a6cd21319316ae76dca5072be701
                                    • Instruction ID: 4e8c4918a49b601fb530cc665a9917d144f7e0bffe35a5a2c25492b7c4112a5a
                                    • Opcode Fuzzy Hash: b886999267e71080994d778d494b7a578643a6cd21319316ae76dca5072be701
                                    • Instruction Fuzzy Hash: 70714861B042B14BDB86BF7D88242EF7FA6EFC1250F14456AD586CB292DF24CC06C3A5
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cdb290b8acb4007851ba7a7c68e7d84f6e8135a533d3c0a6d170bf856538a5e5
                                    • Instruction ID: 33c58970fbb5457b5bdad9df3fc8a392fe578b91bbf34f540bdbde8767a0887e
                                    • Opcode Fuzzy Hash: cdb290b8acb4007851ba7a7c68e7d84f6e8135a533d3c0a6d170bf856538a5e5
                                    • Instruction Fuzzy Hash: 03619F74E052288FDB54DFA9C980AEDBBF1BF59314F249559E40AE7306E730A981CF50
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a19b4ded4c89047306003cb1f04541791de81ea525a36151c3be5db5864dc4b4
                                    • Instruction ID: 16a793f62a50ebea3a257e3e9ad31d193f963e9cccc07e2d79c79389bb3c8fbd
                                    • Opcode Fuzzy Hash: a19b4ded4c89047306003cb1f04541791de81ea525a36151c3be5db5864dc4b4
                                    • Instruction Fuzzy Hash: 04516C75900A15CFC764CF18C888A9ABBF5FF49334F25CA59E47A9B2A1D770E844CB40
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cb3b1f12ecdea024557bbc366a712f8c239508c1edb2d7779094423bf47a8a63
                                    • Instruction ID: 61782b1365b646ef74b188138979b0d05714e0652debb7854542bfe8b03ef5d6
                                    • Opcode Fuzzy Hash: cb3b1f12ecdea024557bbc366a712f8c239508c1edb2d7779094423bf47a8a63
                                    • Instruction Fuzzy Hash: 41412731E083889FCB46DBB4DC1569E7FB5EF82210F1484EAE455CB292EB349D0ACB51
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e7ade6d5df49b1ffebfcf02d4c4e8380c7a8c36325a8179ac8b2ff889a9bd2eb
                                    • Instruction ID: 42e81ced9a32866390ece34f99a2824943a24ac9f383c8be57763dd3280d0029
                                    • Opcode Fuzzy Hash: e7ade6d5df49b1ffebfcf02d4c4e8380c7a8c36325a8179ac8b2ff889a9bd2eb
                                    • Instruction Fuzzy Hash: CF411A74E04228DFDB44DFA9C480AAEBBF1EB89310F108569D816EB354EB31A945CF90
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 813f32bd18d4eb076014ab2f19361cba526510fc865ce14e865d9a38713d9cff
                                    • Instruction ID: 0f2891c97a93ad80ac30e79c19372761a8a46099e7752f3da870b05d5974147a
                                    • Opcode Fuzzy Hash: 813f32bd18d4eb076014ab2f19361cba526510fc865ce14e865d9a38713d9cff
                                    • Instruction Fuzzy Hash: 4B415D74E05228DFCB44DFA8C8946AEBBF1EF49310F14C46AD816EB355EB319946CB50
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1738904705.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_134d000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 028f4ee9fa8cf6fa57d2e9020a6afa3c5792b9f361f93c5cf802c5d26f2ac65d
                                    • Instruction ID: c7bc5b1034320c3b9c6c5abbbcbd95b27ac7adb76dcc303eac9597dc20c0a54d
                                    • Opcode Fuzzy Hash: 028f4ee9fa8cf6fa57d2e9020a6afa3c5792b9f361f93c5cf802c5d26f2ac65d
                                    • Instruction Fuzzy Hash: 3B212571600244DFDB05DF58D9C0B2ABFA5FBA831CF20C5A9E9094B256C736E456CAE1
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ba79b464f73d2c54d71019e1210c2d199649e1798c1890cbdfc027c273f918d7
                                    • Instruction ID: 02a50281778a2264f9dcbf1e3f40b79d1524f90be317729155f1c158dc06a232
                                    • Opcode Fuzzy Hash: ba79b464f73d2c54d71019e1210c2d199649e1798c1890cbdfc027c273f918d7
                                    • Instruction Fuzzy Hash: 7A316FB4E1121ADFDF50DFA9D9856EEBBF1AB08204F10946AD815F3300E7359A40CFA1
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1739369371.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_135d000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 27ee23d62d9a5876024a1987660a4a685ea7414c570ea6af7948fdb6f26a9b22
                                    • Instruction ID: 4957bbf467b9ec8767e20cb02c742c6e3d030dfc4a7dd57aeb13d050a9084b6c
                                    • Opcode Fuzzy Hash: 27ee23d62d9a5876024a1987660a4a685ea7414c570ea6af7948fdb6f26a9b22
                                    • Instruction Fuzzy Hash: 80210471504204EFDB45DF98D9C0F26BBA5FB84B28F20C66DED094B356C376D446CA61
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1739369371.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_135d000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 52bd5b2d2fe796e3a15039347b645bb4f94c2e7b75edff74aa1ddae65db6ce64
                                    • Instruction ID: 24768dfe764fadd9fb25fbc7600a5ef30a4e5c14ae70ec1366f301134e304ba4
                                    • Opcode Fuzzy Hash: 52bd5b2d2fe796e3a15039347b645bb4f94c2e7b75edff74aa1ddae65db6ce64
                                    • Instruction Fuzzy Hash: 34210071604204DFDB55DF58D984F26BBA5EB84B18F20C569DC0A4B256C33AD447CA61
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7c99000592e0025842ce362f8af57ea85428634fdf57ab0c8fa0aff57f935324
                                    • Instruction ID: 4a19781fd61094a1b2f70a98adbc0d487f79848eb03e5fb385351991baa487af
                                    • Opcode Fuzzy Hash: 7c99000592e0025842ce362f8af57ea85428634fdf57ab0c8fa0aff57f935324
                                    • Instruction Fuzzy Hash: EF31C3B0D01268DFDB60DF99C984BDEBFF4AB08314F24855AE409BB250C7755885CF95
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 698abc3bd9c36bfcdd6be18529b7f73818896761d6327ba362d2886ae0e759e4
                                    • Instruction ID: b32af02a47fedf1b0343c016423747f31a07a87eff6f9a4b0e18d7108bdfeb30
                                    • Opcode Fuzzy Hash: 698abc3bd9c36bfcdd6be18529b7f73818896761d6327ba362d2886ae0e759e4
                                    • Instruction Fuzzy Hash: 6C31E0B0D012689FDB60CF99C988BCEBFF4AB08314F24855AE409BB290C7B55885CF91
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 629ced1ee81bd47b905ac288b72174ea4f11ef500d2fe27281105220e3bfaa81
                                    • Instruction ID: a4539d175e08623aef0d676c2b0aaf5570f8a207f720876c77123b5321374e37
                                    • Opcode Fuzzy Hash: 629ced1ee81bd47b905ac288b72174ea4f11ef500d2fe27281105220e3bfaa81
                                    • Instruction Fuzzy Hash: 422190B4E1021ADFDB90DFB9D9456AEBBF1AB08304F10856AD825F7340E7349A41CFA1
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 67da1f99f6bd25e32b68b04293d9c5e764447fca01714fde2f3d4965e03aeee3
                                    • Instruction ID: b4d6b2fbf3585b5e140ad14f887eeec66e133011fae4badcfcbe645b0848b3c6
                                    • Opcode Fuzzy Hash: 67da1f99f6bd25e32b68b04293d9c5e764447fca01714fde2f3d4965e03aeee3
                                    • Instruction Fuzzy Hash: 0011A3B1A003268F8B95DF798C449BFBBF6FFC42607158929E81AD7290DF309D0587A1
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1739369371.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_135d000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bb27c22c867705799f94c7498fe7f29a1ba2199b25176884e95cc5e95bc00ad6
                                    • Instruction ID: c3ee4896247a0d76e1554c2fd648679fa2710ddf1dc6ba8c48687fbf5a3d59c6
                                    • Opcode Fuzzy Hash: bb27c22c867705799f94c7498fe7f29a1ba2199b25176884e95cc5e95bc00ad6
                                    • Instruction Fuzzy Hash: 7A21A1755093808FDB03CF24D994B15BF71EB45218F28C5EAD8498F2A7C33AD40ACB62
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1738904705.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_134d000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction ID: df2675916070f195cf437b7ee7996dc5fcb3d6ae5728831b4405612011ba5736
                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction Fuzzy Hash: 3511E172504280CFCB02CF54D5C4B16BFB1FB94318F24C6A9D8090B256C336E45ACBA1
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0946c92270e40c826c8f83491b6265ed311bb9d54b512dac8136b67bace1031b
                                    • Instruction ID: 89926764aef6cfcfa87a588bb0041584627a2042b82c97ff6f50959b6e3bcdc5
                                    • Opcode Fuzzy Hash: 0946c92270e40c826c8f83491b6265ed311bb9d54b512dac8136b67bace1031b
                                    • Instruction Fuzzy Hash: 412103B59003599FCB10DF9AD988ADEBFF4FB48310F148419E959A7210C375A944CFA5
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dbfe4fed9bd106489b70eeb04b5068873bc90075b7d2fa409ca203e5ab63b1b0
                                    • Instruction ID: ef72d3ea38c5f35ee2ca4d9b834fdf46460d46e569a706a98efb3a39ff454420
                                    • Opcode Fuzzy Hash: dbfe4fed9bd106489b70eeb04b5068873bc90075b7d2fa409ca203e5ab63b1b0
                                    • Instruction Fuzzy Hash: C62103B58002599FCB10CF9AD888ADEBFF4FB48320F148419E959A7350C375A544CFA5
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 88ca7b5e7ea4d062bb9062b8a1e2f24c0c5136ed6f7fd21dc08c728b61e9ccee
                                    • Instruction ID: b21270d0b2b379215262bd8d0dcacd6478d07ab0e963d5124f5dc7be2f340746
                                    • Opcode Fuzzy Hash: 88ca7b5e7ea4d062bb9062b8a1e2f24c0c5136ed6f7fd21dc08c728b61e9ccee
                                    • Instruction Fuzzy Hash: 121104315082846FDB42CB65DC6469A3FB5EF82214F08C1A6E464CB2A2DB34980ACB50
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1739369371.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_135d000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction ID: 918a9a82159ac4fc80f5aa9d527d964f95ce8351dab53924228c79fce82c3a74
                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction Fuzzy Hash: 4711BB75504280DFDB02CF54C5C4B15BFB1FB84628F24C6AEDC494B296C33AD44ACB61
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: aa22d23e1a643bf5e2e496c6c2e06a554fbd880160be4b10cedee0992ead3ffe
                                    • Instruction ID: 48e263edb3be646d2b9a4b8ebd5d1dc6cbced05d6348601ed3bc80fe4a69deef
                                    • Opcode Fuzzy Hash: aa22d23e1a643bf5e2e496c6c2e06a554fbd880160be4b10cedee0992ead3ffe
                                    • Instruction Fuzzy Hash: 9F11A2B1D016189BEB18CF9BD9453DEFEF6AFC8300F04C56AD5097A264DBB509468F90
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9568b6634be3007d6d55ba7b4a64655438d84b2ea4dcc4ca43745ecddf0fd264
                                    • Instruction ID: 6e05fa81539cf4facb1e96dfdf8e241eea723ff3fa4d78ecac13bd4619adbc0e
                                    • Opcode Fuzzy Hash: 9568b6634be3007d6d55ba7b4a64655438d84b2ea4dcc4ca43745ecddf0fd264
                                    • Instruction Fuzzy Hash: A1012632A442246FDB41EF6DDC409DE7FBADFC5310704C0A6E448DB225DB31D8058B94
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 487f6d63fcf101bcfa8e3e2ddc58facb9ce0c937911a31475863f31f6fe27f25
                                    • Instruction ID: 4e6d24a25fa8112d3f06d558b9303d8d6bb4837a4273a89a8129ea4e6d67a2fe
                                    • Opcode Fuzzy Hash: 487f6d63fcf101bcfa8e3e2ddc58facb9ce0c937911a31475863f31f6fe27f25
                                    • Instruction Fuzzy Hash: 9811F2B59002589FDB60DF9AC588BDEFBF4EB48320F20841AD969A7310D375A944CFA5
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1738904705.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_134d000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 14b4f8369485f93222332991959f1972cbc9bd93361d74b0cee1c66540c7c9d9
                                    • Instruction ID: b34a95777003f600122c0625b7730141a749458db5fe963dfb83fe320cdd6bc4
                                    • Opcode Fuzzy Hash: 14b4f8369485f93222332991959f1972cbc9bd93361d74b0cee1c66540c7c9d9
                                    • Instruction Fuzzy Hash: A901A7710083849BE711CEAACD84767BFDCEF51728F18C56AED094A286C779A840CA71
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9a34fc2ae9d52accad1e25a7cc7fbac5b304ad3edeb716ca7a07d2f52e756e4c
                                    • Instruction ID: 6b31d14c88b24b7350e5659730cd8a482678abc6dd28c5091a3f7ab96bcc2321
                                    • Opcode Fuzzy Hash: 9a34fc2ae9d52accad1e25a7cc7fbac5b304ad3edeb716ca7a07d2f52e756e4c
                                    • Instruction Fuzzy Hash: 5411F2B59002598FCB20DF99C588BDEFBF4EB48320F24841AD569B7314D374A544CFA4
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6d64ac704dc330c8c511f813e9e7120318f7a85991be82d90eb0f2d1ada0ccdd
                                    • Instruction ID: b0f6c69aaa2bdd9b20b1e9296833e15095fb9d3a60ac3f99d2f2295223ff0b6c
                                    • Opcode Fuzzy Hash: 6d64ac704dc330c8c511f813e9e7120318f7a85991be82d90eb0f2d1ada0ccdd
                                    • Instruction Fuzzy Hash: 4D118471C00218DFEB14CF9AC4847DEBEF5FB48360F24C569E819AB290D7B58984CB94
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c37d7765fe760a73b7383aeaeb93ce4c2c5eed517eef2220afa456c144862bf5
                                    • Instruction ID: 25aa129aedd7187718c104d01d92f1a4339acbbcf759be95379fca3ef6c78e5c
                                    • Opcode Fuzzy Hash: c37d7765fe760a73b7383aeaeb93ce4c2c5eed517eef2220afa456c144862bf5
                                    • Instruction Fuzzy Hash: DE010070D00218DFDB14CF9AC4847DEBEF5FB48360F24C569E819AB290D7B58984CB94
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6060efa6787ef72c09717c0c45b622cad015dce92bf63894c14f44184db9e654
                                    • Instruction ID: 35049eca753f3dddb690ccc61bbe44949f3dd3137afe9d71d549adb4870c09f9
                                    • Opcode Fuzzy Hash: 6060efa6787ef72c09717c0c45b622cad015dce92bf63894c14f44184db9e654
                                    • Instruction Fuzzy Hash: CF01E8B4E05219DFCB84DFA8C9406AEFBF5EB58300F1084AAD819E3340EB309B01DB91
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ba990b1bef794caa272bdd42e1ee20cfeddc0e184346bd9f03ce068c1f9bfbdd
                                    • Instruction ID: 5f46387d95c9d3af25533c3109ddde653c2ce0568172a56636edf47bce46df12
                                    • Opcode Fuzzy Hash: ba990b1bef794caa272bdd42e1ee20cfeddc0e184346bd9f03ce068c1f9bfbdd
                                    • Instruction Fuzzy Hash: 7A012CB4E052199FDB80DFA8C9406AEBBF4EB59300F1480AAD819E3351EB349E05DB91
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d13b8854992b34f2ede0aebf627b92a61de80acdde4d0137b3c70ae99e98ae41
                                    • Instruction ID: f00e74fa7341435b521bc007f090e04dfc2d3fa6aab74391c59f1dc3c9df9241
                                    • Opcode Fuzzy Hash: d13b8854992b34f2ede0aebf627b92a61de80acdde4d0137b3c70ae99e98ae41
                                    • Instruction Fuzzy Hash: 0FF03C71D0D128DFDB48CB65D5449BDBBBDAF4F300F0199A5E80A5B251DB309A46DB80
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 95280ebcac9096aa8ecb1ccfd70f0de509f7155848e86465df3d11a856c8df4d
                                    • Instruction ID: 16b62b329fae83bf004000f1e96218ba53ccd6b56bdf6786bb805ebee7d1c8d0
                                    • Opcode Fuzzy Hash: 95280ebcac9096aa8ecb1ccfd70f0de509f7155848e86465df3d11a856c8df4d
                                    • Instruction Fuzzy Hash: 79F09036A001186F9B84EF5ADC408AEBBBAEFC5310700C466F919DB324DB30ED049B94
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b8346b3cb7f47a6c5a7e4800d17cd41cdc6a7cc719ee29dcfb0481f39e328f05
                                    • Instruction ID: 278dd2a74e551e5a32c942686dad70ac4e54d202fe37c213a3eeabbbf561f7d2
                                    • Opcode Fuzzy Hash: b8346b3cb7f47a6c5a7e4800d17cd41cdc6a7cc719ee29dcfb0481f39e328f05
                                    • Instruction Fuzzy Hash: 15011DB4E05219DFDB54DFB9D5452AEBFF8EB48301F108469A805E3340EB709A00CF91
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1b6752b9e9105263c83c5aaa62a58c586ac887aeda37b6e3bc7ac2c83a632efb
                                    • Instruction ID: 3f7c959219aad5ce901c727cd04c0a2bb3fbb1dd93b2cb794ed5ecfd5a5baa86
                                    • Opcode Fuzzy Hash: 1b6752b9e9105263c83c5aaa62a58c586ac887aeda37b6e3bc7ac2c83a632efb
                                    • Instruction Fuzzy Hash: 73016D74E052099FDB50DFB9D9052AEBFF8EF49301F1485AAE805E3391EB709A04CB51
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1738904705.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_134d000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3a4868cdf8cab61f39c709c2bdadaebfa486142e4f728b6e6c14c97f1b87644b
                                    • Instruction ID: b6363798d7cfbdb48952f6e1a461f2faa79074a97284eb29aac6916513ffef46
                                    • Opcode Fuzzy Hash: 3a4868cdf8cab61f39c709c2bdadaebfa486142e4f728b6e6c14c97f1b87644b
                                    • Instruction Fuzzy Hash: 71F06271404384AFE7118E5ADC84B62FFE8EF91728F18C45AED085E286C379A844CBB1
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 65bc5ad7289d5e38e001db164ddc59a6ae0f253c7f3399e5b3733b141a5f0cd8
                                    • Instruction ID: 0f222e9540639afd9a068138069ded505307910683407eaf2a6814b781701a24
                                    • Opcode Fuzzy Hash: 65bc5ad7289d5e38e001db164ddc59a6ae0f253c7f3399e5b3733b141a5f0cd8
                                    • Instruction Fuzzy Hash: 8D01DE70C00229DFDB54DFA5C5443AE7AB1EF45350F158925E416AB290D7B44A44CB90
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3d9d6f5855a3fa0eb1460cd65296422df2d86480f8bd9a28b6875df7fb7a3e74
                                    • Instruction ID: 3810fbaa9c167d3ffaab95a825fba53c3fd334961da1adce182542fca6742217
                                    • Opcode Fuzzy Hash: 3d9d6f5855a3fa0eb1460cd65296422df2d86480f8bd9a28b6875df7fb7a3e74
                                    • Instruction Fuzzy Hash: 3AF03C74E052199FCB40EFA8C5446AEFBF4EB49304F008599D825E3340DB71AA05CB84
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 47ec2dc32ee24d04baae9114a492a9a4a2eeb2ed571502e1b1641d3a2ee8fb71
                                    • Instruction ID: a39d22dd0986bb480289b69ba9c7146df917396372ba2a6c3cf00048ae0058bc
                                    • Opcode Fuzzy Hash: 47ec2dc32ee24d04baae9114a492a9a4a2eeb2ed571502e1b1641d3a2ee8fb71
                                    • Instruction Fuzzy Hash: 97F0F82609A7F01AE3427F7CAA612C96F20CF92314F0440A3D1D48D076D44584CDD2EE
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7f431d5e329f03b6035eab97bd245af4a769c4db228d6c75324ad57f0554e3a7
                                    • Instruction ID: 4a6da1bd81efed8f92eba06c4350d650e2f536c1cda5540ae53f2a7f91d9de29
                                    • Opcode Fuzzy Hash: 7f431d5e329f03b6035eab97bd245af4a769c4db228d6c75324ad57f0554e3a7
                                    • Instruction Fuzzy Hash: 0E01EC70C00229DFDB54DFA6C5047AE7BF1FF49350F118925E42AAB290E7B44A44CF90
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c6bd68c35be23e90ae851206a41ce5f3c59f21a7a73a044a650dc88fa312497b
                                    • Instruction ID: 32abddeac5c259e0c1395680f4e11268647bedd5cddd37d2e719c172b5a18a0d
                                    • Opcode Fuzzy Hash: c6bd68c35be23e90ae851206a41ce5f3c59f21a7a73a044a650dc88fa312497b
                                    • Instruction Fuzzy Hash: 4EF0E7B4E05219DFCB94DFE9D5055AEBBF4BB49300F1085AAD819E3300EB309A00DB91
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 810c44d74aa9e2f8607fa311f2ddc5b5c36722a422c62c085127e3c141c12cf4
                                    • Instruction ID: 84ce22e5f98a190bae42bc1e7e2047076b2c13dc9739d6e6a407d89e1e9f59f6
                                    • Opcode Fuzzy Hash: 810c44d74aa9e2f8607fa311f2ddc5b5c36722a422c62c085127e3c141c12cf4
                                    • Instruction Fuzzy Hash: 7AF0E7B4E19219DFCB44DFB9D6456AEBBF4BB49300F108569A819E3300EB30AA00CB91
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2c24aeca859775a3694be42d136059b405d689ddc5817037327fa8163dc3d883
                                    • Instruction ID: 4148e902473b11670f13d856ab06c580551f4adea849e97672e9478d50aa4a55
                                    • Opcode Fuzzy Hash: 2c24aeca859775a3694be42d136059b405d689ddc5817037327fa8163dc3d883
                                    • Instruction Fuzzy Hash: 2DF03972B042286F9304DA6EDCC4D6BBBEEFBCC664355807AFA08C7310DA319C0087A0
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5928d68edc1faf1d3b2d269d7ff32489e226d254c2a09dc3caab770b19e6e888
                                    • Instruction ID: 2a9fda591aa3b6decc1f612b6bf946961bb274a5ec0873562c25abbcb623cb56
                                    • Opcode Fuzzy Hash: 5928d68edc1faf1d3b2d269d7ff32489e226d254c2a09dc3caab770b19e6e888
                                    • Instruction Fuzzy Hash: D8F0E774D052599FDB94DFB9D9052AEBFF0BB49301F10C1AAD819A3240EB749A01DB91
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 08f9d4056f6aa11fe03e61b5d2bf675e79d160d3e398836958f356e1dbc2e07d
                                    • Instruction ID: 09ce0e78adc5bb71a019f20ede7a37c517e6ad74262431b53fa16a72b96c92c8
                                    • Opcode Fuzzy Hash: 08f9d4056f6aa11fe03e61b5d2bf675e79d160d3e398836958f356e1dbc2e07d
                                    • Instruction Fuzzy Hash: 60E0C9767041286F93149A6ED884D6BBBEEFBCD664355817AE508C7310DA319C0186A0
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 029a90334ea68e9510fcaadda29b2654f942628f66d762b4360d04be906feff3
                                    • Instruction ID: aae779ffae95d179c6c9a57458e9c09c5779ffb11f1781dc54bfe48c95313f55
                                    • Opcode Fuzzy Hash: 029a90334ea68e9510fcaadda29b2654f942628f66d762b4360d04be906feff3
                                    • Instruction Fuzzy Hash: 81F09070E1521ACFCB14CFA8C9056EDFFB0EB49320F1482A9E829E3390EB345601DB40
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 74010608c3e5be5c539fce3eeddbd2fa3d682ef9db513ce9c3fcb8a969182222
                                    • Instruction ID: 7d1f1340cf3a416d9e3bd0a5a3869bb63546b1d4a91ca0d860e6103718f6cb68
                                    • Opcode Fuzzy Hash: 74010608c3e5be5c539fce3eeddbd2fa3d682ef9db513ce9c3fcb8a969182222
                                    • Instruction Fuzzy Hash: 38F03AB4D04258EFCB84DFB9C5451ADBBF4EB48300F4099AAD829E3310EB705600CF40
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7b4820b9bc66869cdb7222564cfe0fdbfd04d5c5aea37efe0ea6a7a15b833f45
                                    • Instruction ID: fe8602cd40e12b0fff3ccdba409308501f5ab4d31ae48cb77fe81b07f28f4030
                                    • Opcode Fuzzy Hash: 7b4820b9bc66869cdb7222564cfe0fdbfd04d5c5aea37efe0ea6a7a15b833f45
                                    • Instruction Fuzzy Hash: F0F017B4E0921DEFCB84EFA9D4452ADBFF4EB59300F0088AAD819E3300E73056009B40
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d775d5d4d48beae358302f8e1bd1bd1fb2a7cab27144240071315312fba934fc
                                    • Instruction ID: e9d13489ed35d7c5e49e3cc892f46ae4cef95a2fcedcb62045148c6497e24d49
                                    • Opcode Fuzzy Hash: d775d5d4d48beae358302f8e1bd1bd1fb2a7cab27144240071315312fba934fc
                                    • Instruction Fuzzy Hash: F6F06D70D041589FDB44DFB9C8063ADBFF0AB04300F00C5AAD825E3251EB784604CF40
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fab406559f8a6d068a5a130e38a1510fd2e34eff51d27de77c796a1614e206c2
                                    • Instruction ID: c54a5a957260f61da1216832248c8b9c023c9a4144a1ae727e87e9e53c6d8be0
                                    • Opcode Fuzzy Hash: fab406559f8a6d068a5a130e38a1510fd2e34eff51d27de77c796a1614e206c2
                                    • Instruction Fuzzy Hash: 79F0DAB4D0421A9FDB94DFA9C941AAEBFF4EB48300F1049A9E919E7341E77495018F90
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f6a020bb0bb8cf3318a85a439ea431f91788fbbdd4263d9ff314044048388286
                                    • Instruction ID: be59bdddc1d8e5828067d7d023e7bc1f69a5e695ade11ad238aed78d020b6416
                                    • Opcode Fuzzy Hash: f6a020bb0bb8cf3318a85a439ea431f91788fbbdd4263d9ff314044048388286
                                    • Instruction Fuzzy Hash: A9F0BEB0D0A25A9FCBA4CFA8D90529CBFB0EB06324F5086D9D865A73A1E7305601DB41
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f0461b6061b7baa0d7cf85a8cd3403b6e6b91ced74bb5187cff787aa7d5d9fa3
                                    • Instruction ID: d04404e41a3372e29abf64f209773f212d0f46da427140b39ba7fa2e3847b018
                                    • Opcode Fuzzy Hash: f0461b6061b7baa0d7cf85a8cd3403b6e6b91ced74bb5187cff787aa7d5d9fa3
                                    • Instruction Fuzzy Hash: 6FF090B0D182468FDB54CFA8C505AAEBFF0EF4A314F008599E411DB382D7349101CB80
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9d6397d83abf8b235b30d4fc5b7aa545f090ede3cf84e4c7a1695fe41a9aa551
                                    • Instruction ID: c77f6dcc2f8deca1901e94e406cab29828d7cf234d1889ed7d0f9142ce253340
                                    • Opcode Fuzzy Hash: 9d6397d83abf8b235b30d4fc5b7aa545f090ede3cf84e4c7a1695fe41a9aa551
                                    • Instruction Fuzzy Hash: E6F0C9B4E19218EFCB90DFB8D5456ADBFF4AB19301F1095A9D819E3300E7305B40CB51
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c8162d2b9774573189f999ea46c0b988c84b83bda186f9824e7f2b131a22d20e
                                    • Instruction ID: 2e77b6fc62acb1570c1f85275ae7357fe957566c8eefc50db117d5a57f18fce4
                                    • Opcode Fuzzy Hash: c8162d2b9774573189f999ea46c0b988c84b83bda186f9824e7f2b131a22d20e
                                    • Instruction Fuzzy Hash: 2BE092B4A092489FCB10EFA0E91155E7FB5EB55304F20C199EC09D3385EF362E08DB51
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2d9fd0379753bfa4c82bb3dcae11b27bb6c9361264ebb39f53e3f210c8f40e95
                                    • Instruction ID: e8e01a8da865b90dd556e21a6ab5b665608451c77975e9281c8841e51fda7e97
                                    • Opcode Fuzzy Hash: 2d9fd0379753bfa4c82bb3dcae11b27bb6c9361264ebb39f53e3f210c8f40e95
                                    • Instruction Fuzzy Hash: 30E06D70D192099FD780DFB8C91975A7FF0EB08304F10C4AAD419D7291EBB595058F91
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 526d58d198e1efcfd110230268acbc523150393e360815b84d6158730cee8b7c
                                    • Instruction ID: e5b61e3685d5c3a0d4c3f9387a5524079125f8c426ffacb58d203e6f79016355
                                    • Opcode Fuzzy Hash: 526d58d198e1efcfd110230268acbc523150393e360815b84d6158730cee8b7c
                                    • Instruction Fuzzy Hash: 0CE0C230D0621CDBDB94EBF5D4046ACBBF49B05201F1044A8D80753340DB341F44D7E2
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 12b1f60dd475090b84e674ac02bf5521b50d0cd0a86a1ff132c51d1c577624de
                                    • Instruction ID: ce05c8a8baa000ba2705779b575a7b8f087857d2d6b7350d2d31fc80f7854751
                                    • Opcode Fuzzy Hash: 12b1f60dd475090b84e674ac02bf5521b50d0cd0a86a1ff132c51d1c577624de
                                    • Instruction Fuzzy Hash: C2E0BFB4A0520DEFCB00EFA4E55145EBBB5EB55204B208555E80593354DB726E049B55
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ee95b784ae4a6d8e971bc47a8fb6a660514b1acbab3e08a633a522122abbff6a
                                    • Instruction ID: a1e90b01f28b1de6c707a1302fb8286a4f22ee37767303337dba60180bdd0298
                                    • Opcode Fuzzy Hash: ee95b784ae4a6d8e971bc47a8fb6a660514b1acbab3e08a633a522122abbff6a
                                    • Instruction Fuzzy Hash: B3E046B0D04219DFDB80EFB9C908A5EBBF0FF08600F1188AAC019E7351E77486008F90
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1aa309484299e75b1b5e06fef278ee518a992b5b23220537b96f1fd75db582e7
                                    • Instruction ID: af891ac078e72a094fa7703b90aea471a8ff261e5e7aaf30ca8e26a7d885d083
                                    • Opcode Fuzzy Hash: 1aa309484299e75b1b5e06fef278ee518a992b5b23220537b96f1fd75db582e7
                                    • Instruction Fuzzy Hash: 34C02B30425308C7C6003BD4F50F32C7FACEB01316F402018F00D0B4208F706082D755
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9e5865dfef6313e0ecf0ba55789134349813dde079bf4a94942c040efcde527e
                                    • Instruction ID: 0781dc8296494b80aeeaecbd4f98a7b6a36b4daa0d40c79212104575b381a711
                                    • Opcode Fuzzy Hash: 9e5865dfef6313e0ecf0ba55789134349813dde079bf4a94942c040efcde527e
                                    • Instruction Fuzzy Hash: CFC09B3A154014AE8BC1E754C984C69FEE3FF957007C2CC51F25686035CB21D95C9F52
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d0823cce881a4c46ec52d75e99e05bdc45293172f2e9fade580d739df2bcfc2a
                                    • Instruction ID: 11b69dfaccbfc520956c0eff53bb92fdfca409e97234e331db31bb0879ab539c
                                    • Opcode Fuzzy Hash: d0823cce881a4c46ec52d75e99e05bdc45293172f2e9fade580d739df2bcfc2a
                                    • Instruction Fuzzy Hash: 30C08CBB004140AFDB41E750CC00B897FF2BB61304F89C445E24047072D336C518EF02
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.1754587910.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6130000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e855b06eeb5b6defaa7271bfbacfe48c27794d6a8c38064ceea3004ea5acc721
                                    • Instruction ID: 6ce5dfcfc05099c46cfa4ee98e90fa19a72d71dee26c2b7cfa88416acf3ad35b
                                    • Opcode Fuzzy Hash: e855b06eeb5b6defaa7271bfbacfe48c27794d6a8c38064ceea3004ea5acc721
                                    • Instruction Fuzzy Hash: D8B012751D4225E999C4B7644D8083BD8A0EFF2700BC28C11B39780124CA2088ACA37F

                                    Execution Graph

                                    Execution Coverage:8.9%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:38
                                    Total number of Limit Nodes:3
                                    execution_graph 14598 141ac50 14602 141ad48 14598->14602 14607 141ad38 14598->14607 14599 141ac5f 14603 141ad7c 14602->14603 14604 141ad59 14602->14604 14603->14599 14604->14603 14605 141af80 GetModuleHandleW 14604->14605 14606 141afad 14605->14606 14606->14599 14608 141ad7c 14607->14608 14609 141ad59 14607->14609 14608->14599 14609->14608 14610 141af80 GetModuleHandleW 14609->14610 14611 141afad 14610->14611 14611->14599 14612 141cfe0 14613 141d026 GetCurrentProcess 14612->14613 14615 141d071 14613->14615 14616 141d078 GetCurrentThread 14613->14616 14615->14616 14617 141d0b5 GetCurrentProcess 14616->14617 14618 141d0ae 14616->14618 14619 141d0eb 14617->14619 14618->14617 14620 141d113 GetCurrentThreadId 14619->14620 14621 141d144 14620->14621 14622 141d630 DuplicateHandle 14623 141d6c6 14622->14623 14624 1414668 14625 141467a 14624->14625 14626 1414686 14625->14626 14628 1414779 14625->14628 14629 141479d 14628->14629 14633 1414879 14629->14633 14637 1414888 14629->14637 14634 1414888 14633->14634 14636 141498c 14634->14636 14641 14144b0 14634->14641 14639 14148af 14637->14639 14638 141498c 14638->14638 14639->14638 14640 14144b0 CreateActCtxA 14639->14640 14640->14638 14642 1415918 CreateActCtxA 14641->14642 14644 14159db 14642->14644

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 294 141cfd1-141d06f GetCurrentProcess 298 141d071-141d077 294->298 299 141d078-141d0ac GetCurrentThread 294->299 298->299 300 141d0b5-141d0e9 GetCurrentProcess 299->300 301 141d0ae-141d0b4 299->301 303 141d0f2-141d10d call 141d5b8 300->303 304 141d0eb-141d0f1 300->304 301->300 306 141d113-141d142 GetCurrentThreadId 303->306 304->303 308 141d144-141d14a 306->308 309 141d14b-141d1ad 306->309 308->309
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 0141D05E
                                    • GetCurrentThread.KERNEL32 ref: 0141D09B
                                    • GetCurrentProcess.KERNEL32 ref: 0141D0D8
                                    • GetCurrentThreadId.KERNEL32 ref: 0141D131
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.1840189387.0000000001410000.00000040.00000800.00020000.00000000.sdmp, Offset: 01410000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_1410000_remcos.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: a203ecd0bde57144b0853f567420649388c36b6538c69448791916312968c080
                                    • Instruction ID: 0a91c4093313cc2362400ab5f1038e09d2131911e6dfc9c1e2749957bb572b59
                                    • Opcode Fuzzy Hash: a203ecd0bde57144b0853f567420649388c36b6538c69448791916312968c080
                                    • Instruction Fuzzy Hash: 175155B0D00249CFDB14DFA9C548BDEBFF1AF48304F20846AD159AB360DB749984CB65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 316 141cfe0-141d06f GetCurrentProcess 320 141d071-141d077 316->320 321 141d078-141d0ac GetCurrentThread 316->321 320->321 322 141d0b5-141d0e9 GetCurrentProcess 321->322 323 141d0ae-141d0b4 321->323 325 141d0f2-141d10d call 141d5b8 322->325 326 141d0eb-141d0f1 322->326 323->322 328 141d113-141d142 GetCurrentThreadId 325->328 326->325 330 141d144-141d14a 328->330 331 141d14b-141d1ad 328->331 330->331
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 0141D05E
                                    • GetCurrentThread.KERNEL32 ref: 0141D09B
                                    • GetCurrentProcess.KERNEL32 ref: 0141D0D8
                                    • GetCurrentThreadId.KERNEL32 ref: 0141D131
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.1840189387.0000000001410000.00000040.00000800.00020000.00000000.sdmp, Offset: 01410000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_1410000_remcos.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 202cf66e917a2011ea5e372a1986a258df2cb9cebd7648cfd76d0482edd13834
                                    • Instruction ID: e8c30733f6ffe3cfe3e444032b3f12fba113c9a6754be5b45a1c07b4965102dd
                                    • Opcode Fuzzy Hash: 202cf66e917a2011ea5e372a1986a258df2cb9cebd7648cfd76d0482edd13834
                                    • Instruction Fuzzy Hash: CD5143B0D00209CFDB14DFA9C548BDEBFF1AF88314F20845AE119AB360DB75A984CB65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 360 141ad48-141ad57 361 141ad83-141ad87 360->361 362 141ad59-141ad66 call 141a06c 360->362 363 141ad89-141ad93 361->363 364 141ad9b-141addc 361->364 367 141ad68 362->367 368 141ad7c 362->368 363->364 371 141ade9-141adf7 364->371 372 141adde-141ade6 364->372 415 141ad6e call 141afd0 367->415 416 141ad6e call 141afe0 367->416 368->361 374 141adf9-141adfe 371->374 375 141ae1b-141ae1d 371->375 372->371 373 141ad74-141ad76 373->368 376 141aeb8-141af78 373->376 378 141ae00-141ae07 call 141a078 374->378 379 141ae09 374->379 377 141ae20-141ae27 375->377 410 141af80-141afab GetModuleHandleW 376->410 411 141af7a-141af7d 376->411 382 141ae34-141ae3b 377->382 383 141ae29-141ae31 377->383 381 141ae0b-141ae19 378->381 379->381 381->377 385 141ae48-141ae51 call 141a088 382->385 386 141ae3d-141ae45 382->386 383->382 391 141ae53-141ae5b 385->391 392 141ae5e-141ae63 385->392 386->385 391->392 393 141ae81-141ae85 392->393 394 141ae65-141ae6c 392->394 399 141ae8b-141ae8e 393->399 394->393 396 141ae6e-141ae7e call 141a098 call 141a0a8 394->396 396->393 401 141aeb1-141aeb7 399->401 402 141ae90-141aeae 399->402 402->401 412 141afb4-141afc8 410->412 413 141afad-141afb3 410->413 411->410 413->412 415->373 416->373
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0141AF9E
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.1840189387.0000000001410000.00000040.00000800.00020000.00000000.sdmp, Offset: 01410000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_1410000_remcos.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: ea73e306ce04ca358c65943814e98d60cfcf82d448a130bb83fc43657b9acf95
                                    • Instruction ID: b6ac28a40f8926fdfe6175196baf0cb632a324fdba96ccce49a004003a75a73a
                                    • Opcode Fuzzy Hash: ea73e306ce04ca358c65943814e98d60cfcf82d448a130bb83fc43657b9acf95
                                    • Instruction Fuzzy Hash: 407145B0A01B458FD725DF2AD14475ABBF1BF88314F208A2ED08AD7B64D734E849CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 417 141590c-1415913 418 141591c-14159d9 CreateActCtxA 417->418 420 14159e2-1415a3c 418->420 421 14159db-14159e1 418->421 428 1415a4b-1415a4f 420->428 429 1415a3e-1415a41 420->429 421->420 430 1415a51-1415a5d 428->430 431 1415a60 428->431 429->428 430->431 433 1415a61 431->433 433->433
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 014159C9
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.1840189387.0000000001410000.00000040.00000800.00020000.00000000.sdmp, Offset: 01410000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_1410000_remcos.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 61d03d717b11cdb8d02e16f522769658bf7bc0c988b1df2834ed3753260945ae
                                    • Instruction ID: bab5c436ea479c6f10d3954c058a7256be157b06d0060ee555b53817c2c86d8f
                                    • Opcode Fuzzy Hash: 61d03d717b11cdb8d02e16f522769658bf7bc0c988b1df2834ed3753260945ae
                                    • Instruction Fuzzy Hash: 784101B1C0071DCBDB24CFAAC8857CEBBB5BF89314F24805AD409AB265DB755986CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 434 14144b0-14159d9 CreateActCtxA 437 14159e2-1415a3c 434->437 438 14159db-14159e1 434->438 445 1415a4b-1415a4f 437->445 446 1415a3e-1415a41 437->446 438->437 447 1415a51-1415a5d 445->447 448 1415a60 445->448 446->445 447->448 450 1415a61 448->450 450->450
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 014159C9
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.1840189387.0000000001410000.00000040.00000800.00020000.00000000.sdmp, Offset: 01410000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_1410000_remcos.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 2555312cf148bdd978ed909f49a5ac84cb354f775796a9a60697a63d1c76b431
                                    • Instruction ID: 9fc7353980d16aad8d23df8c8136691b42f6b13115a52f3bdd0fc6f494c978a3
                                    • Opcode Fuzzy Hash: 2555312cf148bdd978ed909f49a5ac84cb354f775796a9a60697a63d1c76b431
                                    • Instruction Fuzzy Hash: D541F2B0C0071DCBDB24CFA9C8847CEBBB5BF49304F24805AD409AB265DB756945CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 451 141d628-141d6c4 DuplicateHandle 452 141d6c6-141d6cc 451->452 453 141d6cd-141d6ea 451->453 452->453
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0141D6B7
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.1840189387.0000000001410000.00000040.00000800.00020000.00000000.sdmp, Offset: 01410000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_1410000_remcos.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 16529c6667b1f0c15ef24781fd53b0bd8665660aaee81259f957d0b721a56081
                                    • Instruction ID: a04148c076f084e5876ed5cdae7562500f7caffe9708c896a2ffc7397c2eeb59
                                    • Opcode Fuzzy Hash: 16529c6667b1f0c15ef24781fd53b0bd8665660aaee81259f957d0b721a56081
                                    • Instruction Fuzzy Hash: 7721E4B5D00208DFDB10CFAAD984ADEBBF5EF48310F14841AE958A3320C378A945CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 456 141d630-141d6c4 DuplicateHandle 457 141d6c6-141d6cc 456->457 458 141d6cd-141d6ea 456->458 457->458
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0141D6B7
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.1840189387.0000000001410000.00000040.00000800.00020000.00000000.sdmp, Offset: 01410000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_1410000_remcos.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 5931b0b9dcebda05dba6b22d88e85424b5cffc52e16a5b4ac4a8de3390a2fe61
                                    • Instruction ID: 9f3e3222c59ba8e4e607cc20ca419251b087ce44089811ec5ab9a91c6b2b4e72
                                    • Opcode Fuzzy Hash: 5931b0b9dcebda05dba6b22d88e85424b5cffc52e16a5b4ac4a8de3390a2fe61
                                    • Instruction Fuzzy Hash: 2321C4B5D002589FDB10CF9AD984ADEBFF4EB48310F14841AE958A7360D374A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 461 141af38-141af78 462 141af80-141afab GetModuleHandleW 461->462 463 141af7a-141af7d 461->463 464 141afb4-141afc8 462->464 465 141afad-141afb3 462->465 463->462 465->464
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0141AF9E
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.1840189387.0000000001410000.00000040.00000800.00020000.00000000.sdmp, Offset: 01410000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_1410000_remcos.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 08933589021c32033270120561fd5a55665a4d724cd5c58f40782244aa748341
                                    • Instruction ID: 40c14bae08282de28abb72f674044893fdd613976b0699667ca24143dcad399b
                                    • Opcode Fuzzy Hash: 08933589021c32033270120561fd5a55665a4d724cd5c58f40782244aa748341
                                    • Instruction Fuzzy Hash: 841110B5C002498FDB10CF9AD444ADEFBF4AB88324F20842AD858A7364C379A545CFA5
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.1839994577.00000000013BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013BD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_13bd000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 16a346caf631162e632d9df01f4ccbf55291b6c6d9bad7d645e7816159a1e5a4
                                    • Instruction ID: b3045b353eae437a4fc8a7fd7155eefce39f82e9132b2ffaa99b31d9033f2729
                                    • Opcode Fuzzy Hash: 16a346caf631162e632d9df01f4ccbf55291b6c6d9bad7d645e7816159a1e5a4
                                    • Instruction Fuzzy Hash: 22213771500244DFDB05DF58D9C0B67BF65FB8831CF20C56AEA090BA56D33AD456CBA1
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.1840052365.00000000013CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_13cd000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a4479a6fd9a9fa877f17e9aaf986d826b7a95fbe0252012b3d35f8be12920017
                                    • Instruction ID: b841f5ffad9480c0bd37c805e71e7cbcc03709eb1a3eca43f984c4beaadba861
                                    • Opcode Fuzzy Hash: a4479a6fd9a9fa877f17e9aaf986d826b7a95fbe0252012b3d35f8be12920017
                                    • Instruction Fuzzy Hash: B4210071604204DFCB15DF58D984B26BBA5FB84B18F20C57DE80A4B256C33AD847CBA1
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.1840052365.00000000013CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_13cd000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f9734f7e42577d25d545b4cb735a099ebeeb4b0cbe4a45c0dbef438f6f936d6f
                                    • Instruction ID: c2a150763e57903b73bdbeeafb3493e6c2d63cfd9340b3085a7591cec01f6000
                                    • Opcode Fuzzy Hash: f9734f7e42577d25d545b4cb735a099ebeeb4b0cbe4a45c0dbef438f6f936d6f
                                    • Instruction Fuzzy Hash: F2210471504204EFDB05DF98D9C4B26BBA6FB84B28F20C67DE9494B256C336D846CBA1
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.1840052365.00000000013CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_13cd000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6e550483268150aff774f862f05d2a8646e9c398df9e4b9dd406d0aad19d19f3
                                    • Instruction ID: e4f449bc36dbe8a6cd4ad55719c31f6fc704cd53df1388dd9203e0273c6d6150
                                    • Opcode Fuzzy Hash: 6e550483268150aff774f862f05d2a8646e9c398df9e4b9dd406d0aad19d19f3
                                    • Instruction Fuzzy Hash: AF2195755083809FCB03CF58D994711BF71EB46214F24C5EAD8498F2A7C33A9806CBA2
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.1839994577.00000000013BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013BD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_13bd000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction ID: aa5849769c3cdaa8b1cbe02de43c1b116f2112ef2ac7439274cc0708d921c804
                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction Fuzzy Hash: 1611E172404280CFCB02CF54D5C4B56BF71FB84318F24C6AAD9090B656C33AD45ACBA1
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.1840052365.00000000013CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_13cd000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction ID: afc1fc5e67ad21be570fb35e1357e5d76ef58611e2adde4d49d03d607b5e6b0a
                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction Fuzzy Hash: 5A11BE76504240DFDB02CF54C5C4B15BF72FB84628F24C6AEE8494B256C33AD80ACB91
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.1839994577.00000000013BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013BD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_13bd000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ebc9bf6d7e22e426114ee60a1d80982ea879e2b98df8451aa76827cb62266f5b
                                    • Instruction ID: ec5d1b9f4f8349d39bf282a04f9457504f9a90b05cb60f535dbc1f976ae00caa
                                    • Opcode Fuzzy Hash: ebc9bf6d7e22e426114ee60a1d80982ea879e2b98df8451aa76827cb62266f5b
                                    • Instruction Fuzzy Hash: D101FC310043849AE7104E5ACDC47D7BF9CDF4132CF18C419EE090A646D2399440C6B1
                                    Memory Dump Source
                                    • Source File: 0000000A.00000002.1839994577.00000000013BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013BD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_10_2_13bd000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a473c74caae6dad82d11fa71c1ce21daf553d12a9b9fc5f3feba2ec16a6ff878
                                    • Instruction ID: 950b29a5dd4ec68c5362a296cfc4adcd3b8f1183dfbef3b80e1e0b1c4e3c30b7
                                    • Opcode Fuzzy Hash: a473c74caae6dad82d11fa71c1ce21daf553d12a9b9fc5f3feba2ec16a6ff878
                                    • Instruction Fuzzy Hash: 15F09C714043849EE7118E1ADCC47A2FFA8EF51738F18C45AED484F696D3799844CAB1

                                    Execution Graph

                                    Execution Coverage:8.7%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:39
                                    Total number of Limit Nodes:4
                                    execution_graph 15802 177cfe0 15803 177d026 GetCurrentProcess 15802->15803 15805 177d071 15803->15805 15806 177d078 GetCurrentThread 15803->15806 15805->15806 15807 177d0b5 GetCurrentProcess 15806->15807 15808 177d0ae 15806->15808 15809 177d0eb 15807->15809 15808->15807 15810 177d113 GetCurrentThreadId 15809->15810 15811 177d144 15810->15811 15812 177ac50 15816 177ad48 15812->15816 15821 177ad38 15812->15821 15813 177ac5f 15817 177ad7c 15816->15817 15818 177ad59 15816->15818 15817->15813 15818->15817 15819 177af80 GetModuleHandleW 15818->15819 15820 177afad 15819->15820 15820->15813 15822 177ace0 15821->15822 15824 177ad42 15821->15824 15822->15813 15823 177ad7c 15823->15813 15824->15823 15825 177af80 GetModuleHandleW 15824->15825 15826 177afad 15825->15826 15826->15813 15827 177d630 DuplicateHandle 15828 177d6c6 15827->15828 15829 1774668 15830 177467a 15829->15830 15831 1774686 15830->15831 15833 1774779 15830->15833 15834 177479d 15833->15834 15838 1774879 15834->15838 15842 1774888 15834->15842 15839 17748af 15838->15839 15841 177498c 15839->15841 15846 17744b0 15839->15846 15844 17748af 15842->15844 15843 177498c 15844->15843 15845 17744b0 CreateActCtxA 15844->15845 15845->15843 15847 1775918 CreateActCtxA 15846->15847 15849 17759db 15847->15849

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 294 177cfd1-177d06f GetCurrentProcess 298 177d071-177d077 294->298 299 177d078-177d0ac GetCurrentThread 294->299 298->299 300 177d0b5-177d0e9 GetCurrentProcess 299->300 301 177d0ae-177d0b4 299->301 303 177d0f2-177d10d call 177d5b8 300->303 304 177d0eb-177d0f1 300->304 301->300 307 177d113-177d142 GetCurrentThreadId 303->307 304->303 308 177d144-177d14a 307->308 309 177d14b-177d1ad 307->309 308->309
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 0177D05E
                                    • GetCurrentThread.KERNEL32 ref: 0177D09B
                                    • GetCurrentProcess.KERNEL32 ref: 0177D0D8
                                    • GetCurrentThreadId.KERNEL32 ref: 0177D131
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.1921520211.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1770000_remcos.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 17191498b06e008f59a8a1d2de8146ca70371e453b90bfa0ad29378076590eb5
                                    • Instruction ID: cca43e509aed6e955831128dcacd7477e9d3762e4ecafab6866f4a6567df9379
                                    • Opcode Fuzzy Hash: 17191498b06e008f59a8a1d2de8146ca70371e453b90bfa0ad29378076590eb5
                                    • Instruction Fuzzy Hash: 3B5146B09003498FDB28DFA9D548B9EFBF1AF98314F208469D019A72A0D7349885CF65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 316 177cfe0-177d06f GetCurrentProcess 320 177d071-177d077 316->320 321 177d078-177d0ac GetCurrentThread 316->321 320->321 322 177d0b5-177d0e9 GetCurrentProcess 321->322 323 177d0ae-177d0b4 321->323 325 177d0f2-177d10d call 177d5b8 322->325 326 177d0eb-177d0f1 322->326 323->322 329 177d113-177d142 GetCurrentThreadId 325->329 326->325 330 177d144-177d14a 329->330 331 177d14b-177d1ad 329->331 330->331
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 0177D05E
                                    • GetCurrentThread.KERNEL32 ref: 0177D09B
                                    • GetCurrentProcess.KERNEL32 ref: 0177D0D8
                                    • GetCurrentThreadId.KERNEL32 ref: 0177D131
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.1921520211.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1770000_remcos.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 51865f5ec7c60567cc41bc4564e0e80ef095b3cdfca62447e255da91e9b0600f
                                    • Instruction ID: 1fc4ece74a24cfae3cd8480831d444e3143ec16214b0ba8fcc28f13a14db0082
                                    • Opcode Fuzzy Hash: 51865f5ec7c60567cc41bc4564e0e80ef095b3cdfca62447e255da91e9b0600f
                                    • Instruction Fuzzy Hash: 845134B09003498FDB28DFAAD548B9EFBF5BF88314F208469D419A7360DB749984CF65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 360 177ad48-177ad57 361 177ad83-177ad87 360->361 362 177ad59-177ad66 call 177a06c 360->362 363 177ad9b-177addc 361->363 364 177ad89-177ad93 361->364 369 177ad7c 362->369 370 177ad68 362->370 371 177adde-177ade6 363->371 372 177ade9-177adf7 363->372 364->363 369->361 417 177ad6e call 177afe0 370->417 418 177ad6e call 177afd0 370->418 371->372 373 177ae1b-177ae1d 372->373 374 177adf9-177adfe 372->374 376 177ae20-177ae27 373->376 377 177ae00-177ae07 call 177a078 374->377 378 177ae09 374->378 375 177ad74-177ad76 375->369 379 177aeb8-177af34 375->379 380 177ae34-177ae3b 376->380 381 177ae29-177ae31 376->381 383 177ae0b-177ae19 377->383 378->383 410 177af36-177af5e 379->410 411 177af60-177af78 379->411 384 177ae3d-177ae45 380->384 385 177ae48-177ae51 call 177a088 380->385 381->380 383->376 384->385 391 177ae53-177ae5b 385->391 392 177ae5e-177ae63 385->392 391->392 393 177ae65-177ae6c 392->393 394 177ae81-177ae85 392->394 393->394 396 177ae6e-177ae7e call 177a098 call 177a0a8 393->396 397 177ae8b-177ae8e 394->397 396->394 400 177aeb1-177aeb7 397->400 401 177ae90-177aeae 397->401 401->400 410->411 412 177af80-177afab GetModuleHandleW 411->412 413 177af7a-177af7d 411->413 414 177afb4-177afc8 412->414 415 177afad-177afb3 412->415 413->412 415->414 417->375 418->375
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0177AF9E
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.1921520211.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1770000_remcos.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 60e8fee8e77ef62639cbd75b4e67c624c2b4d70fe8fa00a7bf2972a7fff46e39
                                    • Instruction ID: 5bbce4a40ac44f3e9d7e0a1ddab927ec17af25cd4fc5f6c140b2839dc84fd39b
                                    • Opcode Fuzzy Hash: 60e8fee8e77ef62639cbd75b4e67c624c2b4d70fe8fa00a7bf2972a7fff46e39
                                    • Instruction Fuzzy Hash: 28813470A00B058FEB24DF29D54579ABBF1FF88304F148A2DD08A9BA54D775E849CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 419 17744b0-17759d9 CreateActCtxA 422 17759e2-1775a3c 419->422 423 17759db-17759e1 419->423 430 1775a3e-1775a41 422->430 431 1775a4b-1775a4f 422->431 423->422 430->431 432 1775a51-1775a5d 431->432 433 1775a60 431->433 432->433 435 1775a61 433->435 435->435
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 017759C9
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.1921520211.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1770000_remcos.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 5f746aaf435399bde317100055c3a8f723cd23e1191f0323c732677dbd1239f9
                                    • Instruction ID: 8c6db6e35effbfc67030620179f4a56f265a3c68b7cd9c7a824fbc6169e96708
                                    • Opcode Fuzzy Hash: 5f746aaf435399bde317100055c3a8f723cd23e1191f0323c732677dbd1239f9
                                    • Instruction Fuzzy Hash: 9741A2B1C00719DBDB24DFA9C844B9DFBB5BF49304F2480AAD408AB255DB755985CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 436 177590c-1775914 437 177591c-17759d9 CreateActCtxA 436->437 439 17759e2-1775a3c 437->439 440 17759db-17759e1 437->440 447 1775a3e-1775a41 439->447 448 1775a4b-1775a4f 439->448 440->439 447->448 449 1775a51-1775a5d 448->449 450 1775a60 448->450 449->450 452 1775a61 450->452 452->452
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 017759C9
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.1921520211.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1770000_remcos.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 1dc0affd23e19fb96d4f869cfa0570bea77baa1b24d2cac24c64d317198ee923
                                    • Instruction ID: 4a7b14f674e9db06c88b7f6e4295f6c7f52f6cfb9b7e04dd2ddc96ac3a51437e
                                    • Opcode Fuzzy Hash: 1dc0affd23e19fb96d4f869cfa0570bea77baa1b24d2cac24c64d317198ee923
                                    • Instruction Fuzzy Hash: D541C1B1C00719CADB24DFAAC9847DEFBB5BF48304F2480AAD418AB255DB755985CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 453 177d628-177d62c 454 177d672-177d6c4 DuplicateHandle 453->454 455 177d62e-177d66f 453->455 456 177d6c6-177d6cc 454->456 457 177d6cd-177d6ea 454->457 455->454 456->457
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0177D6B7
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.1921520211.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1770000_remcos.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: b3085168cf0b5d2a25978c00c6238e74e0b74bdd299db767410b8d68f1ba8b84
                                    • Instruction ID: f03a539398fa58eae387f41c024e6aa6e4dfd285f54029933fdf8769145a82ef
                                    • Opcode Fuzzy Hash: b3085168cf0b5d2a25978c00c6238e74e0b74bdd299db767410b8d68f1ba8b84
                                    • Instruction Fuzzy Hash: F92135B59002499FDB20CFA9D984ADEFFF5EF49320F24811AE958A7350C374A941CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 460 177d630-177d6c4 DuplicateHandle 461 177d6c6-177d6cc 460->461 462 177d6cd-177d6ea 460->462 461->462
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0177D6B7
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.1921520211.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1770000_remcos.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 3f8bec4638d9a805d30648e750e38e4fce4d7b938cae09655985a645e4040c7e
                                    • Instruction ID: 6f2b1e581f88bf4e9f3a7795de2f626ac17f788129846361b4062efcf7daecbf
                                    • Opcode Fuzzy Hash: 3f8bec4638d9a805d30648e750e38e4fce4d7b938cae09655985a645e4040c7e
                                    • Instruction Fuzzy Hash: 0821C4B59002589FDB10CF9AD584ADEFFF4EB48320F14841AE958A7350D374A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 465 177af38-177af78 466 177af80-177afab GetModuleHandleW 465->466 467 177af7a-177af7d 465->467 468 177afb4-177afc8 466->468 469 177afad-177afb3 466->469 467->466 469->468
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0177AF9E
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.1921520211.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_1770000_remcos.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: e2426f9cbebfdd7e37b8e438cf8112e6da99c7f3a1176752a683c41741182e6f
                                    • Instruction ID: 2b979639c4ae9be0f724a5cb406db2065a2cd576a6de72014e7ec20848a3f274
                                    • Opcode Fuzzy Hash: e2426f9cbebfdd7e37b8e438cf8112e6da99c7f3a1176752a683c41741182e6f
                                    • Instruction Fuzzy Hash: F7111DB6C003498FDB10DFAAD444ADEFBF4AB88324F14842AD828A7250C379A545CFA1
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.1921263039.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_16dd000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a91ae220f4728abafc705ece1f7183eff90d50542bd5e7b8e822ad02b4e32535
                                    • Instruction ID: 4dc0f49f46e666b12b51e24bf5f6c34782c2103358ac53b03edd52ebcbd86ab4
                                    • Opcode Fuzzy Hash: a91ae220f4728abafc705ece1f7183eff90d50542bd5e7b8e822ad02b4e32535
                                    • Instruction Fuzzy Hash: 8921F271A04200DFDB15EF68D984B26BFA5EBC8354F24C56DD90A4B396C33AD447CAA1
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.1921263039.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_16dd000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4a818b8bb74b7fac913bf6d2d58c7ae8bbab5c45411a473e6f026f7a4692e125
                                    • Instruction ID: 3a18e37329d8268d88222f98fb7801fb44bce72b1f21ecf09c1fded9c5021c30
                                    • Opcode Fuzzy Hash: 4a818b8bb74b7fac913bf6d2d58c7ae8bbab5c45411a473e6f026f7a4692e125
                                    • Instruction Fuzzy Hash: 5E210471944200EFDB05EF98DDC0F26BBA5FB84324F20C66DEA494B396C336D446CA61
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.1921263039.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_16dd000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7956e559164daa86ba97d47ac96b3917cf6138f1b60b769301101a3a533ec3df
                                    • Instruction ID: f323c35dccbe2a6dcf69edfe527594afb44951b8cb11a3cb62461ddbb7643fe4
                                    • Opcode Fuzzy Hash: 7956e559164daa86ba97d47ac96b3917cf6138f1b60b769301101a3a533ec3df
                                    • Instruction Fuzzy Hash: 802192755083809FCB03DF64D994711BF71EB86214F28C5EAD8498F2A7C33A980ACB62
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.1921263039.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_16dd000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction ID: 309b5c8663a9bcd7ed5ce36d9a0a8681b845b7e89b23aec9df865f843abd6d75
                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction Fuzzy Hash: AA11BB75904280DFDB02DF54C9C4B15BFB1FB84224F24C6AAD9494B796C33AD40ACB61
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.1921171977.00000000016CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_16cd000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cc640e38e19ffa06b2a957c2ffb2aa8cf167e93dc6a4f1263e84ff2848705249
                                    • Instruction ID: 9c48589899783e4921346bbb628a468d42e0b44fd7018ffb878c55eb10aa9720
                                    • Opcode Fuzzy Hash: cc640e38e19ffa06b2a957c2ffb2aa8cf167e93dc6a4f1263e84ff2848705249
                                    • Instruction Fuzzy Hash: 7601A771009380AAE7115A6ACD84777FFD8EF41B24F18C53EED094A286C779D840C6F1
                                    Memory Dump Source
                                    • Source File: 0000000F.00000002.1921171977.00000000016CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_15_2_16cd000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 21cd245a57cf4dd577ffeb4ed6a0dca5403337d5506d62dd338d7b82b9de091d
                                    • Instruction ID: f49b82beced775b5a1ab6d061d6aa6657a1d5bf10a1e465dde1c0b8adbddbb47
                                    • Opcode Fuzzy Hash: 21cd245a57cf4dd577ffeb4ed6a0dca5403337d5506d62dd338d7b82b9de091d
                                    • Instruction Fuzzy Hash: D7F06271405384AEE7119A1ADC84B76FFA8EF51724F18C46EED084A386C3799844CAB1

                                    Execution Graph

                                    Execution Coverage:7.8%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:39
                                    Total number of Limit Nodes:4
                                    execution_graph 16746 f2cfe0 16747 f2d026 GetCurrentProcess 16746->16747 16749 f2d071 16747->16749 16750 f2d078 GetCurrentThread 16747->16750 16749->16750 16751 f2d0b5 GetCurrentProcess 16750->16751 16752 f2d0ae 16750->16752 16753 f2d0eb 16751->16753 16752->16751 16754 f2d113 GetCurrentThreadId 16753->16754 16755 f2d144 16754->16755 16756 f2ac50 16760 f2ad48 16756->16760 16765 f2ad38 16756->16765 16757 f2ac5f 16761 f2ad7c 16760->16761 16762 f2ad59 16760->16762 16761->16757 16762->16761 16763 f2af80 GetModuleHandleW 16762->16763 16764 f2afad 16763->16764 16764->16757 16766 f2ad42 16765->16766 16767 f2ace0 16765->16767 16768 f2ad7c 16766->16768 16769 f2af80 GetModuleHandleW 16766->16769 16767->16757 16768->16757 16770 f2afad 16769->16770 16770->16757 16771 f2d630 DuplicateHandle 16772 f2d6c6 16771->16772 16773 f24668 16774 f2467a 16773->16774 16775 f24686 16774->16775 16777 f24779 16774->16777 16778 f2479d 16777->16778 16782 f24888 16778->16782 16786 f24879 16778->16786 16784 f248af 16782->16784 16783 f2498c 16783->16783 16784->16783 16790 f244b0 16784->16790 16787 f248af 16786->16787 16788 f2498c 16787->16788 16789 f244b0 CreateActCtxA 16787->16789 16789->16788 16791 f25918 CreateActCtxA 16790->16791 16793 f259db 16791->16793

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 294 f2cfd1-f2d06f GetCurrentProcess 298 f2d071-f2d077 294->298 299 f2d078-f2d0ac GetCurrentThread 294->299 298->299 300 f2d0b5-f2d0e9 GetCurrentProcess 299->300 301 f2d0ae-f2d0b4 299->301 303 f2d0f2-f2d10d call f2d5b8 300->303 304 f2d0eb-f2d0f1 300->304 301->300 307 f2d113-f2d142 GetCurrentThreadId 303->307 304->303 308 f2d144-f2d14a 307->308 309 f2d14b-f2d1ad 307->309 308->309
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 00F2D05E
                                    • GetCurrentThread.KERNEL32 ref: 00F2D09B
                                    • GetCurrentProcess.KERNEL32 ref: 00F2D0D8
                                    • GetCurrentThreadId.KERNEL32 ref: 00F2D131
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2002074519.0000000000F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_f20000_remcos.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: b4d9d328d97f80c860752123942e91fdcccf3dfab9df18fb88060e3ea7a82a42
                                    • Instruction ID: d3973d160f7a6ff1f0e188a46453fd48494ca7e1916ab434ddb87b305b3eda5f
                                    • Opcode Fuzzy Hash: b4d9d328d97f80c860752123942e91fdcccf3dfab9df18fb88060e3ea7a82a42
                                    • Instruction Fuzzy Hash: 515165B09013498FDB14DFA9D548BDEBBF1EF48314F20C459E019A72A1DB74A984CF66

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 316 f2cfe0-f2d06f GetCurrentProcess 320 f2d071-f2d077 316->320 321 f2d078-f2d0ac GetCurrentThread 316->321 320->321 322 f2d0b5-f2d0e9 GetCurrentProcess 321->322 323 f2d0ae-f2d0b4 321->323 325 f2d0f2-f2d10d call f2d5b8 322->325 326 f2d0eb-f2d0f1 322->326 323->322 329 f2d113-f2d142 GetCurrentThreadId 325->329 326->325 330 f2d144-f2d14a 329->330 331 f2d14b-f2d1ad 329->331 330->331
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 00F2D05E
                                    • GetCurrentThread.KERNEL32 ref: 00F2D09B
                                    • GetCurrentProcess.KERNEL32 ref: 00F2D0D8
                                    • GetCurrentThreadId.KERNEL32 ref: 00F2D131
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2002074519.0000000000F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_f20000_remcos.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: ca5ead6a7a0197d02c52585434742e25ae211fa432fe3bf04d99364408b4905a
                                    • Instruction ID: 55da35135b297e2eae1b28ec49dc7abda0c7e2caa0904fa9d2259216888ef026
                                    • Opcode Fuzzy Hash: ca5ead6a7a0197d02c52585434742e25ae211fa432fe3bf04d99364408b4905a
                                    • Instruction Fuzzy Hash: 145134B49002498FDB14DFA9D548BDEBBF1EF88314F20C459E419A7360DB74A984CF66

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 360 f2ad48-f2ad57 361 f2ad83-f2ad87 360->361 362 f2ad59-f2ad66 call f2a06c 360->362 364 f2ad9b-f2addc 361->364 365 f2ad89-f2ad93 361->365 368 f2ad68 362->368 369 f2ad7c 362->369 371 f2ade9-f2adf7 364->371 372 f2adde-f2ade6 364->372 365->364 415 f2ad6e call f2afe0 368->415 416 f2ad6e call f2afd0 368->416 369->361 373 f2ae1b-f2ae1d 371->373 374 f2adf9-f2adfe 371->374 372->371 379 f2ae20-f2ae27 373->379 376 f2ae00-f2ae07 call f2a078 374->376 377 f2ae09 374->377 375 f2ad74-f2ad76 375->369 378 f2aeb8-f2af78 375->378 381 f2ae0b-f2ae19 376->381 377->381 410 f2af80-f2afab GetModuleHandleW 378->410 411 f2af7a-f2af7d 378->411 382 f2ae34-f2ae3b 379->382 383 f2ae29-f2ae31 379->383 381->379 386 f2ae48-f2ae51 call f2a088 382->386 387 f2ae3d-f2ae45 382->387 383->382 391 f2ae53-f2ae5b 386->391 392 f2ae5e-f2ae63 386->392 387->386 391->392 393 f2ae81-f2ae85 392->393 394 f2ae65-f2ae6c 392->394 399 f2ae8b-f2ae8e 393->399 394->393 396 f2ae6e-f2ae7e call f2a098 call f2a0a8 394->396 396->393 401 f2ae90-f2aeae 399->401 402 f2aeb1-f2aeb7 399->402 401->402 412 f2afb4-f2afc8 410->412 413 f2afad-f2afb3 410->413 411->410 413->412 415->375 416->375
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00F2AF9E
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2002074519.0000000000F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_f20000_remcos.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 2af5c840b0a8b090ebdbff3af97562bcd8df95bd22573d35cda85c13716c3cec
                                    • Instruction ID: 29d5328fd0eaca5e9b9267fa7e03ef530cb377e158e738eb7f374cd19ad23e8e
                                    • Opcode Fuzzy Hash: 2af5c840b0a8b090ebdbff3af97562bcd8df95bd22573d35cda85c13716c3cec
                                    • Instruction Fuzzy Hash: 27713470A00B158FD724DF2AE54575ABBF1FF88314F10892DD08A97B50D778E84ACB92

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 417 f244b0-f259d9 CreateActCtxA 420 f259e2-f25a3c 417->420 421 f259db-f259e1 417->421 428 f25a4b-f25a4f 420->428 429 f25a3e-f25a41 420->429 421->420 430 f25a60 428->430 431 f25a51-f25a5d 428->431 429->428 433 f25a61 430->433 431->430 433->433
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 00F259C9
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2002074519.0000000000F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_f20000_remcos.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 4f57d1c59c8d1d9277fc15c68de890a8d5483982848ae7d454d39dc36b9255c3
                                    • Instruction ID: 016ed2ca1e925dafb9a3c7ab0660706b29e9a0ab3bdd67268109b840cf3dd238
                                    • Opcode Fuzzy Hash: 4f57d1c59c8d1d9277fc15c68de890a8d5483982848ae7d454d39dc36b9255c3
                                    • Instruction Fuzzy Hash: 4841F2B0D00B2DCBDB24CFA9C885B9DBBF5BF48714F20806AD408AB255DB756985CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 434 f2590c-f259d9 CreateActCtxA 436 f259e2-f25a3c 434->436 437 f259db-f259e1 434->437 444 f25a4b-f25a4f 436->444 445 f25a3e-f25a41 436->445 437->436 446 f25a60 444->446 447 f25a51-f25a5d 444->447 445->444 449 f25a61 446->449 447->446 449->449
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 00F259C9
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2002074519.0000000000F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_f20000_remcos.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: a7088139aed13b81f3f9e25c913fcd78e67d27dc5f6491b98f4f299924a6fe3a
                                    • Instruction ID: 73fbb5c5f59869054af281757621f7f2390dd53353efa418101c4d5f7c7e814d
                                    • Opcode Fuzzy Hash: a7088139aed13b81f3f9e25c913fcd78e67d27dc5f6491b98f4f299924a6fe3a
                                    • Instruction Fuzzy Hash: DA4112B0C00759CFDB14CFA9C88478DBBF1BF49314F24819AD408AB265DB756985CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 450 f2d628-f2d6c4 DuplicateHandle 451 f2d6c6-f2d6cc 450->451 452 f2d6cd-f2d6ea 450->452 451->452
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00F2D6B7
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2002074519.0000000000F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_f20000_remcos.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 5131c9541968ecb1ebebc079066ac9d2fd4005f1e940f5bbe65c997c8bd27388
                                    • Instruction ID: 621c32379143a4c76afe9992094c806c792cac04cdd2dd727e1cfd1e8f8ab853
                                    • Opcode Fuzzy Hash: 5131c9541968ecb1ebebc079066ac9d2fd4005f1e940f5bbe65c997c8bd27388
                                    • Instruction Fuzzy Hash: 2B2114B5900258DFDB10CFAAD584ADEBFF4EB48320F14841AE958A7320C378A941CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 455 f2d630-f2d6c4 DuplicateHandle 456 f2d6c6-f2d6cc 455->456 457 f2d6cd-f2d6ea 455->457 456->457
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00F2D6B7
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2002074519.0000000000F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_f20000_remcos.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: a6e6e3b759073c134d9080c34fdbad01495192728ca577d0f2c4616a003283ad
                                    • Instruction ID: d89089d3ec8b6b1bbde62086c197a601736c40f55f752f34cb1a00aba4f112e0
                                    • Opcode Fuzzy Hash: a6e6e3b759073c134d9080c34fdbad01495192728ca577d0f2c4616a003283ad
                                    • Instruction Fuzzy Hash: 8E21E4B59002189FDB10CF9AD584ADEBFF4EB48320F14841AE958A3310D374A940CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 460 f2af38-f2af78 461 f2af80-f2afab GetModuleHandleW 460->461 462 f2af7a-f2af7d 460->462 463 f2afb4-f2afc8 461->463 464 f2afad-f2afb3 461->464 462->461 464->463
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00F2AF9E
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2002074519.0000000000F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_f20000_remcos.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 4ffffabbf4324eee85994b16948cdcfcb5493724f138d7131fd813ae8c9eda9b
                                    • Instruction ID: 60df2fcb96059df1748003ec63bae63b5c466bb674607cfef0f6283169366a71
                                    • Opcode Fuzzy Hash: 4ffffabbf4324eee85994b16948cdcfcb5493724f138d7131fd813ae8c9eda9b
                                    • Instruction Fuzzy Hash: EB1122B5C003598FCB10CF9AD544ADEFBF4EF88324F10842AD858A7610D379A945CFA1
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2001729070.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_d2d000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 935e72b79dc937250371153cabb24da7149debba78b521d6eecfd9a014931f13
                                    • Instruction ID: 6f1d57bfa0ad445685a77f679d80bc67d3becb5a1d55a8bd7a3025de74b7cc36
                                    • Opcode Fuzzy Hash: 935e72b79dc937250371153cabb24da7149debba78b521d6eecfd9a014931f13
                                    • Instruction Fuzzy Hash: A3212571504240DFDB05DF14E9C0B26BFA6FBA831CF34C569E8494B256C376D856CAB1
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2001830025.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_d3d000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1594445a0571be7f191c20c02d1c5546594fb51f77e19eeeeba15619b3f28e51
                                    • Instruction ID: 56ea4bbf63f945e891679dd2b28ff932ebca0e319b18afaec2f9f7dcff46561f
                                    • Opcode Fuzzy Hash: 1594445a0571be7f191c20c02d1c5546594fb51f77e19eeeeba15619b3f28e51
                                    • Instruction Fuzzy Hash: 48210479504200EFDB05DF14E9C0B27BBA6FB84314F24C66DE8494B296C736D84ACE75
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2001830025.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_d3d000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c8e997f4aad66f224e8f9822ff0168e20ff80a2cb4032318d2dfd35e5609ac03
                                    • Instruction ID: 3495780448f1b9d103e07fa9cf003570ec7ed1b3172206a02459f91b13f6ca12
                                    • Opcode Fuzzy Hash: c8e997f4aad66f224e8f9822ff0168e20ff80a2cb4032318d2dfd35e5609ac03
                                    • Instruction Fuzzy Hash: 6221F271604200DFCB18DF24E9C4B26BBA6FB84B14F24C569E84A4B296C33AD847CE71
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2001830025.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_d3d000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 95ac6d0dc8eb2c75a54d6852d1e7326e35dfe14183acd1198f256566a000812c
                                    • Instruction ID: 562eccace7cee81d836d535df05c066562d9381761c3c86edafd71c71cbbd056
                                    • Opcode Fuzzy Hash: 95ac6d0dc8eb2c75a54d6852d1e7326e35dfe14183acd1198f256566a000812c
                                    • Instruction Fuzzy Hash: C02180755093808FCB06CF24D994715BF72EB46314F28C5EAD8498F2A7C33A980ACB62
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2001729070.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_d2d000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction ID: 7807054cb1cb01d0691bcf678d15a18edfef6a736cadb1b1fc8dea58e96f9751
                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction Fuzzy Hash: 9811D376504280CFDB16CF14D5C4B16BF72FBA4318F28C6A9D8494B656C336D85ACBA1
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2001830025.0000000000D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D3D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_d3d000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction ID: 48e9ea82db0ec22ec01479de0a851d97431f534ac25e63a7a7d3569866c0af2d
                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction Fuzzy Hash: D9118B79504280DFDB16CF14D5C4B16BBA2FB84314F28C6AAD8494B696C33AD85ACF61
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2001729070.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_d2d000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f4ff8f3ebc917ee56138cc215aeaa3e71ad1b566303a72be8a7de753fad74ead
                                    • Instruction ID: a8555db4dee5ff1258c2546e2643051d039b1d03ae35636d0b35e35466085283
                                    • Opcode Fuzzy Hash: f4ff8f3ebc917ee56138cc215aeaa3e71ad1b566303a72be8a7de753fad74ead
                                    • Instruction Fuzzy Hash: 0B01DB711083509AE7108A26ED84767FFD9EF61328F1CC96AED4A4B296C37DDC40D671
                                    Memory Dump Source
                                    • Source File: 00000012.00000002.2001729070.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_18_2_d2d000_remcos.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 098ecfdff81b64ff6b96a12a1fca3fa948aa776775dbf4a1c8aadef67c914558
                                    • Instruction ID: 8712b6e37921d042f2c76769844c8abb34e6077ae27c29823085e4a4eb546e75
                                    • Opcode Fuzzy Hash: 098ecfdff81b64ff6b96a12a1fca3fa948aa776775dbf4a1c8aadef67c914558
                                    • Instruction Fuzzy Hash: 63F09671404354AEE7108A16DDC4B62FFE8EF61738F18C55AED094F296C379AC44CAB1